扫描报告
45 /100
xhs-skill-pusher
小红书内容发布技能 - 规范化cookie管理 + xhs-kit自动化发布
This is a Xiaohongshu content publishing skill that stores cookies locally and uses xhs-kit for automation. While not overtly malicious, it has significant doc-to-code mismatch on shell execution and undeclared behavior.
谨慎使用
Before using, verify the xhs-kit source, pin dependency versions, and add explicit shell/filesystem declarations to SKILL.md
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Shell execution not declared in SKILL.md 文档欺骗 | bin/xhs-pusher.mjs:24 |
| 中危 | xhs-kit installed without version pinning 供应链 | SKILL.md:50 |
| 中危 | ~/.openclaw/workspace reference without disclosure 敏感访问 | bin/xhs-pusher.mjs:162 |
| 低危 | NPM dependencies use unpinned version ranges 供应链 | package.json:18 |
| 低危 | Cookie storage without encryption or secure handling 凭证窃取 | scripts/xhs_save_cookie.sh:88 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✗ 越权 | bin/xhs-pusher.mjs:24 execSync |
| 文件系统 | NONE | WRITE | ✗ 越权 | scripts/xhs_save_cookie.sh:90 mkdir + file write |
| 网络访问 | NONE | READ | ✗ 越权 | xhs-kit makes API calls to xiaohongshu.com |
| 环境变量 | NONE | READ | ✓ 一致 | xhs-kit may read env vars for auth |
1 项发现
提示 邮箱 邮箱地址
[email protected] PUSH_GUIDE.md:47 目录结构
12 文件 · 73.4 KB · 2815 行 Shell 5f · 1308L
Markdown 5f · 1097L
JavaScript 1f · 373L
JSON 1f · 37L
├─
▾
bin
│ └─
xhs-pusher.mjs
JavaScript
├─
▾
docs
│ ├─
QUICK_START.md
Markdown
│ └─
XHS_FINAL_SOLUTION.md
Markdown
├─
▾
scripts
│ ├─
xhs_final.sh
Shell
│ ├─
xhs_manage.sh
Shell
│ ├─
xhs_save_cookie.sh
Shell
│ └─
xhs_simple.sh
Shell
├─
package.json
JSON
├─
PUSH_GUIDE.md
Markdown
├─
push_to_github.sh
Shell
├─
README.md
Markdown
└─
SKILL.md
Markdown
依赖分析 4 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
xhs-kit | * | pip | 否 | Not pinned - could be replaced with malicious version |
playwright | * | pip | 否 | Not pinned |
commander | ^11.1.0 | npm | 否 | Caret range without lock file hash |
chalk | ^5.3.0 | npm | 否 | Caret range without lock file hash |
安全亮点
✓ No base64-encoded payloads or obfuscation found
✓ No direct IP connections or C2 communication patterns
✓ No credential harvesting loops over environment variables
✓ No curl|bash or wget|sh remote script execution
✓ No hidden instructions in HTML comments or binary blobs
✓ No attempts to access ~/.ssh, ~/.aws, or other credential paths
✓ Uses a legitimate, documented automation library (xhs-kit) for a real platform