扫描报告
25 /100
pinchtab
Browser automation via HTTP API. Use for headless browser control, web automation, form filling, data extraction, and interactive element interaction.
Skill is a legitimate browser automation tool backed by a local HTTP API, but contains hardcoded service credentials and vague credential handling in docs.
可以安装
Replace hardcoded PinchTab API tokens with environment variable references only. Document credential sourcing clearly in SKILL.md.
安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Hardcoded PinchTab API tokens in four shell scripts 凭证窃取 | scripts/launch_browser.sh, scripts/navigate_to_url.sh, scripts/click_element.sh, scripts/get_page_snapshot.sh:6, 6, 6, 5 |
| 低危 | SKILL.md does not mention hardcoded credentials or credential sourcing 文档欺骗 | SKILL.md:1 |
| 低危 | External data exfiltration via Telegram (acceptable but undocumented risk) 敏感访问 | scripts/screenshot_and_send.sh, scripts/decode_screenshot.py:60, 68 |
| 提示 | base64 -d usage is legitimate (false positive from pre-scan) 代码混淆 | scripts/screenshot_and_send.sh:46 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | WRITE | WRITE | ✓ 一致 | All scripts use bash to call curl/POST/GET to localhost:9867 |
| 文件系统 | READ | READ | ✓ 一致 | Scripts read no files beyond their own code; decode_screenshot.py writes to --ou… |
| 网络访问 | READ | READ | ✓ 一致 | Scripts communicate with localhost:9867 (PinchTab) and api.telegram.org — both d… |
| 环境变量 | NONE | READ | ✓ 一致 | All scripts read PINCHTAB_TOKEN and TELEGRAM_BOT_TOKEN from environment; this is… |
1 严重 3 项发现
严重 编码执行 Base64 编码执行(代码混淆)
base64 -d scripts/screenshot_and_send.sh:46 中危 外部 URL 外部 URL
https://api.telegram.org/bot scripts/decode_screenshot.py:68 中危 外部 URL 外部 URL
https://api.telegram.org/bot$ scripts/screenshot_and_send.sh:60 目录结构
10 文件 · 11.6 KB · 420 行 Markdown 4f · 171L
Shell 5f · 125L
Python 1f · 124L
├─
▾
references
│ ├─
api-endpoints.md
Markdown
│ ├─
common-workflows.md
Markdown
│ └─
troubleshooting.md
Markdown
├─
▾
scripts
│ ├─
click_element.sh
Shell
│ ├─
decode_screenshot.py
Python
│ ├─
get_page_snapshot.sh
Shell
│ ├─
launch_browser.sh
Shell
│ ├─
navigate_to_url.sh
Shell
│ └─
screenshot_and_send.sh
Shell
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | unpinned | pip (imported in decode_screenshot.py) | 否 | requests is not pinned to a specific version in any requirements.txt — latest could introduce breaking changes |
安全亮点
✓ No reverse shell, C2, or data-theft behavior observed
✓ SKILL.md accurately describes the skill's purpose as browser automation via HTTP API
✓ Base64 decoding is legitimate image processing, not code obfuscation
✓ No credential exfiltration to attacker-controlled servers
✓ Telegram sending is opt-in and requires explicit chat_id argument
✓ decode_screenshot.py properly uses requests.Session-like patterns with error handling
✓ All shell scripts use set -e for safe exit on errors
✓ No eval(), os.system with user input, or other RCE primitives found
✓ No attempts to access ~/.ssh, ~/.aws, .env, or other sensitive host paths
✓ No cron, systemd, or persistence mechanisms installed