扫描报告
40 /100
interactive-infographic
AI automation drawing and complex information visualization tool based on ContextWeave
Skill contains hardcoded API key and undeclared data transmission with insufficient documentation about default credential usage.
谨慎使用
Remove hardcoded fallback API key from source code. Add explicit documentation explaining when and how the default anonymous credential is used versus user-provided credentials.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Hardcoded fallback API key in source code 凭证窃取 | scripts/cw_client.cjs:14 |
| 中危 | Insufficient documentation of default credential behavior 文档欺骗 | SKILL.md:120 |
| 低危 | Non-obvious allowlisted domain 敏感访问 | scripts/cw_client.cjs:38 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | WRITE | ✓ 一致 | cw_client.cjs:exportCode writes diagram.cw to target path |
| 网络访问 | WRITE | WRITE | ✓ 一致 | postJson() makes HTTP POST to allowed hosts |
| 命令执行 | NONE | NONE | — | No subprocess or exec calls found |
| 环境变量 | READ | READ | ✓ 一致 | Reads CONTEXTWEAVE_MCP_API_KEY and CONTEXTWEAVE_EDITOR_PROTOCOL |
2 项发现
中危 外部 URL 外部 URL
https://pptx.chenxitech.site SKILL.md:177 中危 外部 URL 外部 URL
https://api.contextweave.site cwmcp_config.example.json:2 目录结构
9 文件 · 26.8 KB · 794 行 JavaScript 6f · 599L
Markdown 1f · 180L
JSON 2f · 15L
├─
▾
scripts
│ ├─
cw_client.cjs
JavaScript
│ ├─
edit_contextweave.cjs
JavaScript
│ ├─
export_contextweave_code.cjs
JavaScript
│ ├─
export_session_asset.cjs
JavaScript
│ ├─
generate_contextweave.cjs
JavaScript
│ └─
import_contextweave_code.cjs
JavaScript
├─
_meta.json
JSON
├─
cwmcp_config.example.json
JSON
└─
SKILL.md
Markdown
安全亮点
✓ No shell execution or subprocess calls found - skill uses only Node.js standard library
✓ Path traversal protection implemented with CWD validation and absolute path requirements
✓ Host allowlist restricts network requests to known domains only
✓ No obfuscation techniques (no base64, eval, or encoded strings)
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env files
✓ No persistence mechanisms (no cron, startup hooks, or backdoor installation)
✓ No credential harvesting beyond declared environment variable
✓ Explicit JSON output format reduces prompt injection risk