Scan Report
45 /100
xhs-skill-pusher
小红书内容发布技能 - 规范化cookie管理 + xhs-kit自动化发布
This is a Xiaohongshu content publishing skill that stores cookies locally and uses xhs-kit for automation. While not overtly malicious, it has significant doc-to-code mismatch on shell execution and undeclared behavior.
Use with caution
Before using, verify the xhs-kit source, pin dependency versions, and add explicit shell/filesystem declarations to SKILL.md
Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Shell execution not declared in SKILL.md Doc Mismatch | bin/xhs-pusher.mjs:24 |
| Medium | xhs-kit installed without version pinning Supply Chain | SKILL.md:50 |
| Medium | ~/.openclaw/workspace reference without disclosure Sensitive Access | bin/xhs-pusher.mjs:162 |
| Low | NPM dependencies use unpinned version ranges Supply Chain | package.json:18 |
| Low | Cookie storage without encryption or secure handling Credential Theft | scripts/xhs_save_cookie.sh:88 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | NONE | WRITE | ✗ Violation | bin/xhs-pusher.mjs:24 execSync |
| Filesystem | NONE | WRITE | ✗ Violation | scripts/xhs_save_cookie.sh:90 mkdir + file write |
| Network | NONE | READ | ✗ Violation | xhs-kit makes API calls to xiaohongshu.com |
| Environment | NONE | READ | ✓ Aligned | xhs-kit may read env vars for auth |
1 findings
Info Email 邮箱地址
[email protected] PUSH_GUIDE.md:47 File Tree
12 files · 73.4 KB · 2815 lines Shell 5f · 1308L
Markdown 5f · 1097L
JavaScript 1f · 373L
JSON 1f · 37L
├─
▾
bin
│ └─
xhs-pusher.mjs
JavaScript
├─
▾
docs
│ ├─
QUICK_START.md
Markdown
│ └─
XHS_FINAL_SOLUTION.md
Markdown
├─
▾
scripts
│ ├─
xhs_final.sh
Shell
│ ├─
xhs_manage.sh
Shell
│ ├─
xhs_save_cookie.sh
Shell
│ └─
xhs_simple.sh
Shell
├─
package.json
JSON
├─
PUSH_GUIDE.md
Markdown
├─
push_to_github.sh
Shell
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 4 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
xhs-kit | * | pip | No | Not pinned - could be replaced with malicious version |
playwright | * | pip | No | Not pinned |
commander | ^11.1.0 | npm | No | Caret range without lock file hash |
chalk | ^5.3.0 | npm | No | Caret range without lock file hash |
Security Positives
✓ No base64-encoded payloads or obfuscation found
✓ No direct IP connections or C2 communication patterns
✓ No credential harvesting loops over environment variables
✓ No curl|bash or wget|sh remote script execution
✓ No hidden instructions in HTML comments or binary blobs
✓ No attempts to access ~/.ssh, ~/.aws, or other credential paths
✓ Uses a legitimate, documented automation library (xhs-kit) for a real platform