Trusted — Risk Score 5/100
Last scan:18 hr ago Rescan
5 /100
ai-test-case-generator
AI自动生成测试用例工具。基于高级测试架构师角色,使用等价类划分、场景分析法、正交分解、状态迁移等方法生成覆盖全面的测试用例集。
This is a pure LLM prompt-based skill with no executable code. Network behavior (Markdown to Excel conversion) is fully declared and documented, and the SSL verification bypasses (-k flag, verify=False) are standard practices for internal corporate tools.
Skill Nameai-test-case-generator
Duration32.8s
Enginepi
Safe to install
No action required. The skill is safe to use as documented.

Findings 1 items

Severity Finding Location
Low
SSL verification bypass documented as feature Doc Mismatch
The skill includes curl -k flag and requests verify=False for internal network access. This is intentional and documented for corporate intranet environments.
curl -k -X POST "http://office-tools.wh.ctrm.5636cloud.com/api/v1/office/md-to-excel"
→ This is standard practice for internal tools and does not pose a security risk when used in trusted internal networks.
SKILL.md:118
ResourceDeclaredInferredStatusEvidence
Filesystem NONE NONE No file operations in skill definition
Network READ READ ✓ Aligned SKILL.md:118-143 - Declared API endpoint for Markdown to Excel conversion
Shell NONE NONE No shell execution; curl/python commands are documentation examples only
Environment NONE NONE No environment variable access
Skill Invoke NONE NONE No skill invocation
Clipboard NONE NONE No clipboard access
Browser NONE NONE No browser access
Database NONE NONE No database access
2 findings
🔗
Medium External URL 外部 URL
http://office-tools.wh.ctrm.5636cloud.com/api/v1/office/md-to-excel
SKILL.md:118
🔗
Medium External URL 外部 URL
http://office-tools.wh.ctrm.5636cloud.com/api/v1/office/download/20260309/测试用例_Excel格式_20260309165529.xlsx
SKILL.md:145

File Tree

1 files · 7.6 KB · 162 lines
Markdown 1f · 162L
└─ 📝 SKILL.md Markdown 162L · 7.6 KB

Security Positives

✓ Pure LLM prompt-based skill with no executable code
✓ All network behavior is explicitly declared in documentation
✓ No credential harvesting or sensitive data access
✓ No obfuscation or hidden functionality
✓ No malicious dependencies or supply chain concerns
✓ Clear purpose and well-documented behavior
✓ No shell execution or file system manipulation