扫描报告
45 /100
imap-idle-sneder
IMAP IDLE email listener with Feishu notifications
Skill performs legitimate IMAP email monitoring but contains hardcoded credentials and undeclared network access to IMAP server and Feishu API.
谨慎使用
Move all credentials to environment variables or a separate config file. Declare network:WRITE and credential access in SKILL.md. Consider using existing config management instead of hardcoding secrets.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Hardcoded email credentials in source code 凭证窃取 | scripts/imap_idle.py:37 |
| 高危 | Hardcoded Feishu API credentials 凭证窃取 | scripts/imap_idle.py:127 |
| 中危 | Undeclared network access 文档欺骗 | SKILL.md:1 |
| 中危 | Email content sent to third-party service 数据外泄 | scripts/imap_idle.py:180 |
| 低危 | Dependencies without version pinning 供应链 | scripts/imap_idle.py:26 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | NONE | WRITE | ✗ 越权 | scripts/imap_idle.py:136,198 |
| 文件系统 | NONE | WRITE | ✗ 越权 | scripts/imap_idle.py:52-53 writes to workspace and log files |
| 环境变量 | NONE | READ | ✗ 越权 | Credentials should be env-based but are hardcoded |
3 项发现
中危 外部 URL 外部 URL
https://open.feishu.cn/open-apis/auth/v3/tenant_access_token/internal scripts/imap_idle.py:136 中危 外部 URL 外部 URL
https://open.feishu.cn/open-apis/im/v1/messages?receive_id_type=open_id scripts/imap_idle.py:198 提示 邮箱 邮箱地址
[email protected] scripts/imap_idle.py:36 目录结构
2 文件 · 18.4 KB · 485 行 Python 1f · 407L
Markdown 1f · 78L
├─
▾
scripts
│ └─
imap_idle.py
Python
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
imap-tools | * | pip | 否 | Version not pinned |
beautifulsoup4 | * | pip | 否 | Version not pinned, used for HTML parsing |
安全亮点
✓ Script functionality is legitimate - email notification service
✓ No reverse shell, C2 communication, or obvious malicious code
✓ No base64 encoding or obfuscation detected
✓ No attempts to access ~/.ssh, ~/.aws, or other credential paths
✓ Uses standard libraries (imaplib, urllib) rather than suspicious tools