扫描报告
50 /100
fund-daily
自动生成基金日报,包含持仓基金数据、估值涨跌、单位净值和财经要闻
Skill performs multiple undeclared network requests and subprocess execution, with hardcoded credentials exposed in source code.
谨慎使用
1) Declare network:READ and network:WRITE permissions for API calls; 2) Document subprocess usage in SKILL.md; 3) Move Telegram credentials to environment variables instead of hardcoding; 4) Pin dependency versions in requirements.txt
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Undeclared network API access 文档欺骗 | fund_daily.py:155 |
| 中危 | Undeclared subprocess execution 文档欺骗 | fund_daily.py:157 |
| 中危 | Hardcoded Telegram credentials 凭证窃取 | fund_daily.py:85 |
| 低危 | Undeclared filesystem write operation 文档欺骗 | fund_daily.py:340 |
| 低危 | Unpinned Python dependencies 供应链 | requirements.txt:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | NONE | READ+WRITE | ✗ 越权 | fund_daily.py:155-163 (HTTP requests to fundgz.1234567.com.cn, api.fund.eastmone… |
| 命令执行 | NONE | WRITE | ✗ 越权 | fund_daily.py:155-163 (subprocess.run() executes python script) |
| 文件系统 | NONE | WRITE | ✗ 越权 | fund_daily.py:340-348 (creates directories and saves Word documents) |
| 技能调用 | NONE | READ | ✗ 越权 | fund_daily.py:155 (invokes news-market skill script) |
4 项发现
中危 外部 URL 外部 URL
http://fundgz.1234567.com.cn/js/ fund_daily.py:155 中危 外部 URL 外部 URL
http://fund.eastmoney.com/ fund_daily.py:158 中危 外部 URL 外部 URL
http://api.fund.eastmoney.com/f10/lsjz fund_daily.py:216 中危 外部 URL 外部 URL
https://api.telegram.org/bot fund_daily.py:309 目录结构
4 文件 · 27.2 KB · 950 行 Python 1f · 581L
Markdown 2f · 367L
Text 1f · 2L
├─
fund_daily.py
Python
├─
README.md
Markdown
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | * | pip | 否 | Version not pinned - risk of supply chain attack |
python-docx | * | pip | 否 | Version not pinned - risk of supply chain attack |
安全亮点
✓ No evidence of credential harvesting beyond required Telegram tokens
✓ No base64-encoded or obfuscated code detected
✓ No reverse shell or C2 communication patterns found
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env files
✓ No hidden functionality beyond legitimate fund data fetching
✓ Subprocess usage serves documented feature (news aggregation) rather than malicious purpose