Scan Report
15 /100
b2b-sdr-agent
Open-source B2B AI SDR template with multi-channel sales, WhatsApp IP isolation, and remote server deployment
Legitimate B2B sales agent template with documented deployment capabilities. Critical IOC (curl|bash) is a standard NodeSource installer from a trusted official source, not malicious remote code execution.
Safe to install
This skill is safe to use. The shell:WRITE capability is necessary for its documented remote server deployment purpose. No hidden credential harvesting or exfiltration observed.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | SSH password in memory | deploy/deploy.sh:76 |
| Info | WireGuard private key extraction | deploy/ip-isolate.sh:136 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | WRITE | WRITE | ✓ Aligned | SKILL.md:deploy section describes SSH-based remote deployment |
| Filesystem | WRITE | WRITE | ✓ Aligned | Creates configs in /root/.openclaw and /root/.config |
| Network | READ | READ | ✓ Aligned | Jina AI API, ipinfo.io for IP detection |
| Environment | NONE | NONE | — | No evidence of os.environ iteration or credential scanning |
1 Critical 1 High 24 findings
Critical Dangerous Command 危险 Shell 命令
curl -fsSL https://deb.nodesource.com/setup_22.x | bash deploy/deploy.sh:160 High IP Address 硬编码 IP 地址
1.1.1.1 README.md:333 Medium External URL 外部 URL
https://memos-dashboard.openmem.net ANTI-AMNESIA.md:36 Medium External URL 外部 URL
https://api.openmem.net/v1 ANTI-AMNESIA.md:37 Medium External URL 外部 URL
https://ai.pulseagent.io ANTI-AMNESIA.md:790 Medium External URL 外部 URL
https://openclaw.dev README.ar.md:7 Medium External URL 外部 URL
http://YOUR_SERVER_IP:18789/?token=YOUR_GATEWAY_TOKEN README.md:239 Medium External URL 外部 URL
https://1.1.1.1/ README.md:333 Medium External URL 外部 URL
https://news.ycombinator.com/submit SOCIAL-PUBLISH-PROMPTS.md:32 Medium External URL 外部 URL
https://www.reddit.com/r/SaaS/submit SOCIAL-PUBLISH-PROMPTS.md:62 Medium External URL 外部 URL
https://www.reddit.com/r/sales/submit SOCIAL-PUBLISH-PROMPTS.md:99 Medium External URL 外部 URL
https://www.reddit.com/r/artificial/submit SOCIAL-PUBLISH-PROMPTS.md:135 Medium External URL 外部 URL
https://x.com/compose/post SOCIAL-PUBLISH-PROMPTS.md:227 Medium External URL 外部 URL
https://www.linkedin.com/feed/ SOCIAL-PUBLISH-PROMPTS.md:269 Medium External URL 外部 URL
https://dev.to/new SOCIAL-PUBLISH-PROMPTS.md:360 Medium External URL 外部 URL
https://zhuanlan.zhihu.com/write SOCIAL-PUBLISH-PROMPTS.md:431 Medium External URL 外部 URL
https://www.producthunt.com/posts/new SOCIAL-PUBLISH-PROMPTS.md:462 Medium External URL 外部 URL
https://openclaw.dev/changelog deploy/UPGRADE.md:13 Medium External URL 外部 URL
https://deb.nodesource.com/setup_22.x deploy/deploy.sh:160 Medium External URL 外部 URL
https://ipinfo.io/ip deploy/ip-isolate.sh:218 Medium External URL 外部 URL
https://s.jina.ai/QUERY_URL_ENCODED skills/lead-discovery/SKILL.md:37 Medium External URL 外部 URL
https://r.jina.ai/https://target-company.com skills/lead-discovery/SKILL.md:44 Medium External URL 外部 URL
https://jina.ai/ skills/lead-discovery/SKILL.md:49 Medium External URL 外部 URL
http://SERVER_IP: workspace/TOOLS.md:31 File Tree
46 files · 310.8 KB · 7801 lines Markdown 33f · 5713L
Shell 5f · 1036L
JavaScript 4f · 675L
HTML 1f · 220L
JSON 3f · 157L
├─
▾
deploy
│ ├─
deploy.sh
Shell
│ ├─
generate-config.sh
Shell
│ ├─
ip-isolate.sh
Shell
│ ├─
skill-profiles.sh
Shell
│ └─
UPGRADE.md
Markdown
├─
▾
examples
│ ├─
▾
electronics
│ │ ├─
IDENTITY.md
Markdown
│ │ └─
USER.md
Markdown
│ ├─
▾
heavy-vehicles
│ │ ├─
▾
product-kb
│ │ │ └─
catalog.json
JSON
│ │ ├─
IDENTITY.md
Markdown
│ │ └─
USER.md
Markdown
│ └─
▾
textiles
│ ├─
IDENTITY.md
Markdown
│ └─
USER.md
Markdown
├─
▾
product-kb
│ ├─
▾
products
│ │ └─
▾
example-product
│ │ └─
info.json
JSON
│ ├─
▾
scripts
│ │ └─
generate-pi.js
JavaScript
│ └─
catalog.json
JSON
├─
▾
scripts
│ └─
proactive-summary.mjs
JavaScript
├─
▾
skills
│ ├─
▾
chroma-memory
│ │ ├─
chroma.mjs
JavaScript
│ │ └─
SKILL.md
Markdown
│ ├─
▾
delivery-queue
│ │ ├─
deliver.sh
Shell
│ │ └─
SKILL.md
Markdown
│ ├─
▾
lead-discovery
│ │ └─
SKILL.md
Markdown
│ ├─
▾
quotation-generator
│ │ └─
SKILL.md
Markdown
│ ├─
▾
sdr-humanizer
│ │ └─
SKILL.md
Markdown
│ ├─
▾
supermemory
│ │ ├─
SKILL.md
Markdown
│ │ └─
sm.mjs
JavaScript
│ └─
▾
telegram-toolkit
│ └─
SKILL.md
Markdown
├─
▾
workspace
│ ├─
AGENTS.md
Markdown
│ ├─
HEARTBEAT.md
Markdown
│ ├─
IDENTITY.md
Markdown
│ ├─
MEMORY.md
Markdown
│ ├─
SOUL.md
Markdown
│ ├─
TOOLS.md
Markdown
│ └─
USER.md
Markdown
├─
ANTI-AMNESIA.md
Markdown
├─
LAUNCH-CONTENT.md
Markdown
├─
README.ar.md
Markdown
├─
README.es.md
Markdown
├─
README.fr.md
Markdown
├─
README.ja.md
Markdown
├─
README.md
Markdown
├─
README.pt-BR.md
Markdown
├─
README.ru.md
Markdown
├─
README.zh-CN.md
Markdown
├─
SKILL.md
Markdown
├─
social-preview.html
HTML
└─
SOCIAL-PUBLISH-PROMPTS.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
wgcf | 2.2.22 | GitHub releases | No | WireGuard Cloudflare WARP tool - binary download from ViRb3/wgcf |
wireproxy | 1.0.9 | GitHub releases | No | SOCKS5 proxy built on WireGuard - binary from pufferffish/wireproxy |
Security Positives
✓ No credential harvesting - no iteration through os.environ for API keys
✓ No data exfiltration - no network calls to unknown external IPs for stealing data
✓ No base64-encoded payloads or obfuscated code
✓ No reverse shell or C2 infrastructure detected
✓ Input validation present in deliver.sh (validate_channel, validate_recipient, validate_id, validate_delay)
✓ Path traversal protection in cancel command
✓ Security constraints documented in lead-discovery (blocked internal IPs, rate limits)
✓ API keys stay in config files and are not exfiltrated
✓ exec-approvals set to 'full' security mode in deploy.sh