扫描报告
5 /100
ghostshield
Anti-colleague distillation shield - protects code style from AI extraction
GhostShield is a legitimate code obfuscation tool that analyzes and protects coding style from AI distillation. No malicious behavior, credential theft, or data exfiltration detected. All functionality is properly documented.
可以安装
This skill is safe to use. Consider pinning dependency versions for better supply chain security.
安全发现 1 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Dependencies not version-pinned 供应链 | requirements.txt:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | Operates on user-specified input paths only |
| 命令执行 | NONE | READ | ✓ 一致 | Uses subprocess for git log analysis, documented and necessary for core function… |
| 网络访问 | NONE | NONE | — | No network requests made |
| 环境变量 | NONE | NONE | — | Does not access environment variables |
7 项发现
中危 外部 URL 外部 URL
https://img.shields.io/badge/License-GPLv3-blue.svg README.md:5 中危 外部 URL 外部 URL
https://www.gnu.org/licenses/gpl-3.0 README.md:5 中危 外部 URL 外部 URL
https://img.shields.io/badge/python-3.8+-blue.svg README.md:6 中危 外部 URL 外部 URL
https://www.python.org/downloads/ README.md:6 中危 外部 URL 外部 URL
https://git.company.com/... SKILL.md:55 提示 邮箱 邮箱地址
[email protected] README.md:122 提示 邮箱 邮箱地址
[email protected] SKILL.md:52 目录结构
10 文件 · 110.1 KB · 3455 行 Python 7f · 2795L
Markdown 2f · 641L
Text 1f · 19L
├─
▾
ghostshield
│ ├─
__init__.py
Python
│ ├─
cli.py
Python
│ ├─
core.py
Python
│ ├─
obfuscator.py
Python
│ ├─
pii_detector.py
Python
│ ├─
style_analyzer.py
Python
│ └─
validator.py
Python
├─
README.md
Markdown
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 5 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
presidio-analyzer | >=2.2.0 | pip | 否 | Version not pinned |
presidio-anonymizer | >=2.2.0 | pip | 否 | Version not pinned |
spacy | >=3.5.0 | pip | 否 | Version not pinned |
jieba | >=0.42.1 | pip | 否 | Version not pinned |
gitpython | >=3.1.0 | pip | 否 | Version not pinned |
安全亮点
✓ No credential harvesting or exfiltration
✓ No network requests to external IPs
✓ No base64/obfuscated code execution
✓ Documentation accurately describes all functionality
✓ All subprocess usage is legitimate git analysis (documented)
✓ No access to sensitive system paths (~/.ssh, ~/.aws, .env)
✓ No reverse shell or C2 communication
✓ Open source GPL-3.0 license with transparent codebase