Scan Report
45 /100
imap-idle-sneder
IMAP IDLE email listener with Feishu notifications
Skill performs legitimate IMAP email monitoring but contains hardcoded credentials and undeclared network access to IMAP server and Feishu API.
Use with caution
Move all credentials to environment variables or a separate config file. Declare network:WRITE and credential access in SKILL.md. Consider using existing config management instead of hardcoding secrets.
Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| High | Hardcoded email credentials in source code Credential Theft | scripts/imap_idle.py:37 |
| High | Hardcoded Feishu API credentials Credential Theft | scripts/imap_idle.py:127 |
| Medium | Undeclared network access Doc Mismatch | SKILL.md:1 |
| Medium | Email content sent to third-party service Data Exfil | scripts/imap_idle.py:180 |
| Low | Dependencies without version pinning Supply Chain | scripts/imap_idle.py:26 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | NONE | WRITE | ✗ Violation | scripts/imap_idle.py:136,198 |
| Filesystem | NONE | WRITE | ✗ Violation | scripts/imap_idle.py:52-53 writes to workspace and log files |
| Environment | NONE | READ | ✗ Violation | Credentials should be env-based but are hardcoded |
3 findings
Medium External URL 外部 URL
https://open.feishu.cn/open-apis/auth/v3/tenant_access_token/internal scripts/imap_idle.py:136 Medium External URL 外部 URL
https://open.feishu.cn/open-apis/im/v1/messages?receive_id_type=open_id scripts/imap_idle.py:198 Info Email 邮箱地址
[email protected] scripts/imap_idle.py:36 File Tree
2 files · 18.4 KB · 485 lines Python 1f · 407L
Markdown 1f · 78L
├─
▾
scripts
│ └─
imap_idle.py
Python
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
imap-tools | * | pip | No | Version not pinned |
beautifulsoup4 | * | pip | No | Version not pinned, used for HTML parsing |
Security Positives
✓ Script functionality is legitimate - email notification service
✓ No reverse shell, C2 communication, or obvious malicious code
✓ No base64 encoding or obfuscation detected
✓ No attempts to access ~/.ssh, ~/.aws, or other credential paths
✓ Uses standard libraries (imaplib, urllib) rather than suspicious tools