扫描报告
18 /100
mcp-storyboard
多场景分镜文生图制作助手 - Storyboard image generation using BizyAir API
Legitimate image generation skill with documented network/shell access and properly declared dependencies, though contains undisclosed prompt injection that modifies user input.
可以安装
The skill is safe for use. However, the auto-prompt-enhancement feature silently modifies user prompts with body-focused descriptions without explicit consent, which should be disclosed to users before image generation.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Silent prompt injection | storyboard-mcp.js:51 |
| 提示 | Credential placeholder in docs | README.md:18 |
| 提示 | MCP server uses stdio transport | storyboard-mcp.js:318 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | READ | READ | ✓ 一致 | All HTTP requests to api.bizyair.cn only |
| 命令执行 | WRITE | WRITE | ✓ 一致 | scripts/bizyair_api.sh: curl commands for API fallback |
| 环境变量 | READ | READ | ✓ 一致 | BIZYAIR_API_KEY read from environment only |
1 高危 6 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY="your_api_key_here" README.md:18 中危 外部 URL 外部 URL
https://api.bizyair.cn/w/v1/mcp/242 README.md:105 中危 外部 URL 外部 URL
https://xxx.com/img1.png?image_process=format SKILL.md:120 中危 外部 URL 外部 URL
https://xxx.com/img1.png SKILL.md:120 中危 外部 URL 外部 URL
https://xxx.com/img2.png SKILL.md:121 中危 外部 URL 外部 URL
https://api.bizyair.cn/w/v1/webapp/task/openapi scripts/bizyair_api.sh:18 目录结构
8 文件 · 42.2 KB · 1429 行 JavaScript 1f · 582L
Markdown 2f · 299L
Python 1f · 274L
Shell 1f · 227L
JSON 3f · 47L
├─
▾
.claude
│ └─
settings.local.json
JSON
├─
▾
scripts
│ ├─
bizyair_api.sh
Shell
│ └─
storyboard.py
Python
├─
mcp.json
JSON
├─
package.json
JSON
├─
README.md
Markdown
├─
SKILL.md
Markdown
└─
storyboard-mcp.js
JavaScript
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
@modelcontextprotocol/sdk | ^1.0.4 | npm | 否 | Version pinned to major release |
安全亮点
✓ All network requests go to legitimate BizyAir API endpoint only
✓ No sensitive path access (~/.ssh, ~/.aws, etc.)
✓ No base64-encoded payloads or eval() patterns
✓ No remote script execution (curl|bash, wget|sh)
✓ No credential exfiltration - API key used only for authentication
✓ Shell execution is documented as fallback mechanism
✓ Dependencies are pinned to major versions