扫描报告
5 /100
tx-cos
面向 OpenClaw 的腾讯云 COS 原生操作技能
tx-cos is a legitimate Tencent Cloud COS object storage skill using only the official cos-nodejs-sdk-v5 SDK for cloud operations, with no malicious behavior, exfiltration, or hidden functionality.
可以安装
No action needed. Consider adding an explicit allowed-tools declaration in SKILL.md for transparency.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Missing allowed-tools resource declaration | SKILL.md:1 |
| 低危 | Credential access without exfiltration | scripts/lib.js:38 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | READ | ✓ 一致 | scripts/upload_file.js:16, scripts/upload_batch.js:11 — reads local files via fs… |
| 环境变量 | NONE | READ | ✓ 一致 | scripts/lib.js:32 — accesses COS_SECRET_ID, COS_SECRET_KEY, COS_REGION, COS_BUCK… |
| 网络访问 | NONE | READ | ✓ 一致 | scripts/lib.js:38 — instantiates cos-nodejs-sdk-v5 for Tencent Cloud COS API cal… |
| 命令执行 | NONE | NONE | — | No child_process, exec, or shell invocation found across all scripts |
| 技能调用 | NONE | NONE | — | No skill self-invocation or cross-skill calls |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser automation |
| 数据库 | NONE | NONE | — | No database access |
目录结构
11 文件 · 21.0 KB · 739 行 JavaScript 10f · 566L
Markdown 1f · 173L
├─
▾
scripts
│ ├─
check_config.js
JavaScript
│ ├─
delete_folder.js
JavaScript
│ ├─
generate_signed_url.js
JavaScript
│ ├─
get_folder_stats.js
JavaScript
│ ├─
lib.js
JavaScript
│ ├─
list_objects.js
JavaScript
│ ├─
manage_objects.js
JavaScript
│ ├─
upload_batch.js
JavaScript
│ ├─
upload_file.js
JavaScript
│ └─
upload_large_file.js
JavaScript
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
cos-nodejs-sdk-v5 | * | npm | 否 | Official Tencent Cloud COS SDK; version not pinned but this is a standard SDK dependency |
安全亮点
✓ All 10 scripts are pure Node.js with no shell, exec, or child_process calls
✓ Uses only the official cos-nodejs-sdk-v5 SDK — no curl/wget, no eval, no base64 decoding
✓ No credential exfiltration: environment variables used only for SDK auth
✓ No access to sensitive local paths (~/.ssh, ~/.aws, .env files)
✓ No remote code execution, reverse shells, or C2 indicators
✓ No hidden functionality in HTML comments or whitespace
✓ Output sanitization: SKILL.md explicitly requires no credential leakage in responses
✓ Deletion operations have confirmatory logic with user-facing safeguards
✓ No dependency installation at runtime (pip/npm install not present)