扫描报告
20 /100
x-mobile-longshot
Render X (Twitter) posts, long articles, and mobile reading pages into mobile-style long screenshots and optional single-page PDFs using Playwright.
This is a legitimate X/Twitter screenshot rendering tool with undocumented shell execution for PDF conversion, but the risk is minimal as file paths are script-generated and Playwright usage is properly documented.
可以安装
Declare the filesystem WRITE and shell:WRITE permissions in SKILL.md for transparency. Consider moving Python image processing to a Node.js library to eliminate the spawnSync pattern.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Shell execution not declared in SKILL.md 文档欺骗 | scripts/render_x_longshot.js:77 |
| 低危 | Filesystem write access not declared 文档欺骗 | scripts/render_x_longshot.js:83 |
| 提示 | Python code injection via template strings 代码混淆 | scripts/render_x_longshot.js:120 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | WRITE | ✗ 越权 | scripts/render_x_longshot.js:83 fs.mkdirSync |
| 命令执行 | NONE | WRITE | ✗ 越权 | scripts/render_x_longshot.js:77 spawnSync('python3', ['-c', code]) |
| 浏览器 | READ | READ | ✓ 一致 | scripts/render_x_longshot.js:89 chromium.launch() with user-provided URLs |
| 网络访问 | READ | READ | ✓ 一致 | scripts/render_x_longshot.js:91 page.goto(args.url) |
| 环境变量 | NONE | NONE | — | No environment variable access detected |
1 项发现
中危 外部 URL 外部 URL
https://x.com/i/status/2030475950752710891 SKILL.md:16 目录结构
3 文件 · 9.4 KB · 280 行 JavaScript 1f · 171L
Markdown 2f · 109L
├─
▾
references
│ └─
notes.md
Markdown
├─
▾
scripts
│ └─
render_x_longshot.js
JavaScript
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
playwright | * | npm | 否 | No version pin - could install latest which may have vulnerabilities |
pillow | * | pip | 否 | Runtime dependency via spawnSync, not declared in package.json |
安全亮点
✓ No credential harvesting or sensitive file access
✓ No network exfiltration or C2 communication
✓ No base64 encoding or obfuscation patterns
✓ No curl|bash or remote script execution
✓ Browser automation via Playwright is properly documented
✓ File paths are script-generated, not user-controlled, reducing injection risk