Scan Report
15 /100
Li_ETL_handle
ETL 自动化处理技能 - Excel/CSV 文件读取、写入、清洗、转换、合并
Legitimate Excel ETL skill with documented security considerations (xlsx vulnerability, executeScript risk), no hidden malicious behavior detected.
Safe to install
This skill is safe for use with standard precautions: only process trusted Excel/CSV files, be cautious with executeScript() when passing custom functions, and consider upgrading xlsx package when available.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Medium | xlsx dependency has known vulnerabilities Supply Chain | package.json:1 |
| Low | executeScript allows arbitrary function execution RCE | index.js:640 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ+WRITE | READ+WRITE | ✓ Aligned | readExcel/readCSV for READ, writeExcel/writeCSV for WRITE - documented in SKILL.… |
| Network | NONE | NONE | — | No HTTP/HTTPS requests in code; purely local file processing |
| Shell | NONE | NONE | — | No child_process or shell execution found |
| Environment | NONE | NONE | — | No os.environ iteration or secret harvesting |
| Skill Invoke | NONE | NONE | — | No nested skill invocations |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser automation |
| Database | NONE | NONE | — | No database connections |
14 findings
Medium External URL 外部 URL
https://clawhub.com/skills/li-excel-handle README.md:158 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/adler-32/-/adler-32-1.3.1.tgz package-lock.json:19 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/cfb/-/cfb-1.2.2.tgz package-lock.json:28 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/codepage/-/codepage-1.15.0.tgz package-lock.json:41 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/crc-32/-/crc-32-1.2.2.tgz package-lock.json:50 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/csv-parser/-/csv-parser-3.2.0.tgz package-lock.json:62 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/csv-stringify/-/csv-stringify-6.7.0.tgz package-lock.json:74 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/frac/-/frac-1.1.2.tgz package-lock.json:80 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/ssf/-/ssf-0.11.2.tgz package-lock.json:89 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/wmf/-/wmf-1.0.2.tgz package-lock.json:101 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/word/-/word-0.3.0.tgz package-lock.json:110 Medium External URL 外部 URL
http://mirrors.tencentyun.com/npm/xlsx/-/xlsx-0.18.5.tgz package-lock.json:119 Medium External URL 外部 URL
https://clawhub.com/skills/li-etl-handle skill.yaml:49 Info Email 邮箱地址
[email protected] tests/scenario.test.js:187 File Tree
16 files · 103.6 KB · 3578 lines JavaScript 4f · 2115L
Markdown 7f · 1171L
JSON 2f · 217L
YAML 1f · 64L
CSV 2f · 11L
├─
▾
tests
│ ├─
▾
scenarios
│ │ ├─
dataset_issues.md
Markdown
│ │ └─
scenario4_raw.csv
CSV
│ ├─
▾
temp
│ │ └─
test_convert.csv
CSV
│ ├─
scenario.test.js
JavaScript
│ └─
unit.test.js
JavaScript
├─
CLAWHUB_SECURITY_CHECK.md
Markdown
├─
index.js
JavaScript
├─
package-lock.json
JSON
├─
package.json
JSON
├─
README.md
Markdown
├─
SECURITY_AUDIT.md
Markdown
├─
SECURITY_FIXES.md
Markdown
├─
SKILL.md
Markdown
├─
skill.yaml
YAML
├─
TEST_REPORT.md
Markdown
└─
test.js
JavaScript
Dependencies 3 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
xlsx | ^0.18.5 | npm | Yes | Has vulnerabilities GHSA-4r6h-8v6p-xvw6 and GHSA-5pgg-2g8v-p4x9 - documented in security docs |
csv-parser | ^3.0.0 | npm | No | Version not pinned (minor), standard package |
csv-stringify | ^6.4.0 | npm | No | Version not pinned (minor), standard package |
Security Positives
✓ No credential theft - does not access environment variables for API keys or secrets
✓ No C2 communication - no external network requests or data exfiltration
✓ No obfuscation - all code is readable and clear
✓ Complete documentation - SKILL.md lists all features accurately
✓ Comprehensive security documentation - SECURITY_AUDIT.md, CLAWHUB_SECURITY_CHECK.md, SECURITY_FIXES.md
✓ No sensitive path access - does not read ~/.ssh, ~/.aws, .env or similar files
✓ No reverse shell or RCE - no child_process execution
✓ Data masking functionality - maskSensitiveData() for PII protection
✓ Transparent about risks - known vulnerabilities documented