Scan Report
55 /100
turing-pot-biglog
Query and tip Big Log — the permanent AI round archiver for The Turing Pot
The skill exhibits significant doc-to-code mismatch with base64-encoded WebSocket messages, accesses TURING_POT_PRIVATE_KEY environment variable to derive authentication tokens, and attempts dynamic module loading from relative paths—none of which are declared in documentation.
Use with caution
Do not use until the maintainer clarifies why messages are base64-encoded and why the private key environment variable is accessed. Request the unencoded protocol specification.
Attack Chain 5 steps
◎
Entry Skill masquerades as simple log querying tool through SKILL.md
SKILL.md:1⬡
Escalation Accesses TURING_POT_PRIVATE_KEY from environment
scripts/biglog.js:55⬡
Escalation Loads external module from relative path for key processing
scripts/biglog.js:57⬡
Escalation Derives public key and sends it to remote WebSocket server
scripts/biglog.js:61◉
Impact All communication base64-encoded, obscuring protocol from inspection
scripts/biglog.js:51Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Undeclared base64 encoding of WebSocket messages Doc Mismatch | scripts/biglog.js:51 |
| High | Undeclared TURING_POT_PRIVATE_KEY environment variable access Credential Theft | scripts/biglog.js:55 |
| Medium | Dynamic module loading from predictable relative path Supply Chain | scripts/biglog.js:57 |
| Low | Base64 decoding of incoming messages not documented Obfuscation | scripts/biglog.js:111 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ | READ+WRITE | ✓ Aligned | scripts/biglog.js:51,97-107 — base64enc wraps all outgoing messages |
| Environment | NONE | READ | ✗ Violation | scripts/biglog.js:55 — process.env.TURING_POT_PRIVATE_KEY |
| Filesystem | NONE | READ | ✗ Violation | scripts/biglog.js:57 — require() with path traversal |
| Shell | NONE | NONE | — | N/A |
| Skill Invoke | NONE | NONE | — | N/A |
| Clipboard | NONE | NONE | — | N/A |
| Browser | NONE | NONE | — | N/A |
| Database | NONE | NONE | — | N/A |
1 Critical 2 findings
Critical Encoded Execution Base64 编码执行(代码混淆)
Buffer.from(s, 'base64' scripts/biglog.js:51 Medium External URL 外部 URL
https://lurker.pedals.tech/WWTurn87sdKd223iPsIa9sf0s11oijd98d233GTR89dimd8WiqqW56kkws90lla/ SKILL.md:4 File Tree
4 files · 14.3 KB · 461 lines Markdown 2f · 268L
JavaScript 1f · 172L
JSON 1f · 21L
├─
▾
scripts
│ └─
biglog.js
JavaScript
├─
package.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
ws | ^8.18.0 | npm | No | Optional dependency, WebSocket client library |
turing-pot/solana-lite.js | unknown | relative_path | No | Loaded dynamically from ../../turing-pot/scripts/ — NOT a declared dependency, potential supply chain risk |
Security Positives
✓ No hardcoded credentials or API keys in source code
✓ WebSocket connection target is documented in SKILL.md
✓ No direct shell command execution (subprocess/popen)
✓ No attempt to read ~/.ssh, ~/.aws, or other sensitive paths directly
✓ Error handling present with timeouts and graceful exits
✓ MIT license declared in package.json