扫描报告
45 /100
toq
Agent-to-agent secure messaging protocol
Legitimate agent-to-agent communication tool with significant doc-to-code mismatch: missing permission declarations, documented but risky curl|sh installation, and extensive persistence mechanisms without proper disclosure.
谨慎使用
Approve with caveats: Require explicit allowed-tools declaration for shell:WRITE, network:READ, filesystem:WRITE; warn users about curl|sh risks; add prominent security warnings for handler and service creation features.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Missing allowed-tools declaration 文档欺骗 | SKILL.md:1 |
| 中危 | Unverified remote script execution 供应链 | SKILL.md:25 |
| 中危 | Hardcoded example IP in documentation 文档欺骗 | references/handlers.md:104 |
| 中危 | Service creation instructions not flagged 持久化 | SKILL.md:179 |
| 低危 | Security features buried in references 文档欺骗 | references/security.md:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✗ 越权 | SKILL.md:25 - curl|sh, SKILL.md:37-41 - toq setup/send commands |
| 网络访问 | NONE | READ | ✗ 越权 | SKILL.md:25 - fetches install.sh, SKILL.md:33 - curls ifconfig.me |
| 文件系统 | NONE | WRITE | ✗ 越权 | SKILL.md:47-50 - creates ~/handlers/, SKILL.md:179-193 - systemd service files |
1 严重 1 高危 4 项发现
严重 危险命令 危险 Shell 命令
curl -sSf https://toq.dev/install.sh | sh SKILL.md:25 高危 IP 地址 硬编码 IP 地址
1.2.3.4 references/handlers.md:104 中危 外部 URL 外部 URL
https://toq.dev/install.sh SKILL.md:25 中危 外部 URL 外部 URL
http://www.apple.com/DTDs/PropertyList-1.0.dtd references/security.md:83 目录结构
5 文件 · 19.9 KB · 584 行 Markdown 5f · 584L
├─
▾
references
│ ├─
commands.md
Markdown
│ ├─
conversational.md
Markdown
│ ├─
handlers.md
Markdown
│ └─
security.md
Markdown
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
toq | * | https://toq.dev/install.sh | 否 | External binary installed via curl|sh without verification |
安全亮点
✓ Comprehensive security walkthrough provided in references/security.md
✓ Approval mode recommended as default (not open mode)
✓ Credential scanning and redaction mentioned for LLM handlers
✓ Connection modes (approval, allowlist) provide access control
✓ Clear documentation of tool functionality and purpose
✓ Handler patterns use proper quoting and input validation
✓ Alpha disclaimer warns against sensitive data transmission