低风险 — 风险评分 10/100
上次扫描:20 小时前 重新扫描
10 /100
1password
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
A legitimate 1Password CLI integration skill with properly documented tmux-based session management for secret retrieval. No malicious behavior, obfuscation, or credential exfiltration detected.
技能名称1password
分析耗时30.0s
引擎pi
可以安装
Skill appears safe for use. Ensure tmux socket directories have appropriate permissions and consider adding version pinning for the 'op' CLI binary.

安全发现 2 项

严重性 安全发现 位置
低危
Predictable tmux socket path in /tmp 权限提升
Socket files are created in a predictable location under TMPDIR with dynamic session names. While standard practice, this could theoretically be targeted if an attacker has local access.
SOCKET_DIR="${TMPDIR:-/tmp}/clawdbot-tmux-sockets"
→ Consider using more restrictive permissions or private tmux sessions without shared sockets.
SKILL.md:33
提示
CLI version check requires 'op' binary 文档欺骗
The skill checks for op CLI presence via 'op --version' which implies filesystem READ access to binary path and shell execution privileges.
op --version
→ Document this implicit requirement in the capability declaration.
SKILL.md:18
资源类型声明权限推断权限状态证据
文件系统 WRITE WRITE ✓ 一致 SKILL.md: 'op read --out-file ./key.pem' for SSH key export
命令执行 WRITE WRITE ✓ 一致 SKILL.md: tmux commands with shell tool send-keys for op CLI interaction
环境变量 NONE READ ✓ 一致 SKILL.md: 'op run --env-file ./env' reads .env but does not exfiltrate
技能调用 NONE NONE No cross-skill invocation detected
网络访问 NONE NONE All network traffic is via the 1Password desktop app integration (out of scope)
1 项发现
🔗
中危 外部 URL 外部 URL
https://developer.1password.com/docs/cli/get-started/
SKILL.md:4

目录结构

4 文件 · 4.2 KB · 104 行
Markdown 3f · 99L JSON 1f · 5L
├─ 📁 references
│ ├─ 📝 cli-examples.md Markdown 29L · 720 B
│ └─ 📝 get-started.md Markdown 17L · 994 B
├─ 📋 _meta.json JSON 5L · 128 B
└─ 📝 SKILL.md Markdown 53L · 2.4 KB

安全亮点

✓ No base64-encoded or obfuscated code found
✓ No credential harvesting or API key enumeration detected
✓ No external IP communication or data exfiltration
✓ Documentation accurately reflects implementation behavior
✓ Credentials are accessed through the legitimate 1Password CLI (op), not scraped from environment
✓ Secrets are not logged or exposed to stdout in plaintext
✓ Uses --no-masking flag in op run to respect 1Password's secret masking policy
✓ Fresh tmux session per operation limits session reuse attacks