扫描报告
15 /100
workout-tracker
Personal fitness tracker - records workout data, parses movements/sets/reps/weight, writes to local MySQL database
A legitimate fitness tracking skill with proper SQL injection protection, local-only database access, and parameterized queries. The placeholder passwords in documentation are clearly marked as examples for user replacement.
可以安装
No immediate action required. The skill follows security best practices. Consider updating documentation to use more visibly placeholder-style passwords (e.g., 'REPLACE_WITH_YOUR_PASSWORD') to reduce confusion.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Placeholder passwords in documentation 文档欺骗 | SKILL.md:30 |
| 提示 | Reads .env configuration file 敏感访问 | scripts/init_database.py:89 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | READ | ✓ 一致 | Reads .env files for config loading, documented in SKILL.md |
| 网络访问 | READ | READ | ✓ 一致 | package.json repository URL only, no runtime network access |
| 命令执行 | NONE | NONE | — | No shell execution in Python scripts |
| 环境变量 | READ | READ | ✓ 一致 | Reads MYSQL_* env vars for database connection |
| 技能调用 | NONE | NONE | — | No skill invocation detected |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser automation |
| 数据库 | WRITE | WRITE | ✓ 一致 | Local MySQL via unix_socket only, fully documented |
3 高危 4 项发现
高危 API 密钥 疑似硬编码凭证
PASSWORD="your_secure_password" SKILL.md:30 高危 API 密钥 疑似硬编码凭证
PASSWORD="your_secure_password_here" SKILL.md:91 高危 API 密钥 疑似硬编码凭证
PASSWORD="temporary_password" TOOLS.md:66 中危 外部 URL 外部 URL
https://clawhub.ai/query1988/workout-tracker package.json:18 目录结构
6 文件 · 40.7 KB · 1267 行 Markdown 3f · 848L
Python 2f · 361L
JSON 1f · 58L
├─
▾
scripts
│ ├─
init_database.py
Python
│ └─
verify_setup.py
Python
├─
package.json
JSON
├─
README.md
Markdown
├─
SKILL.md
Markdown
└─
TOOLS.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
mysql-connector-python | * | pip | 否 | Version not pinned but package is from Oracle, widely used |
安全亮点
✓ All SQL queries use parameterized statements preventing SQL injection
✓ Local-only database connection via unix socket, no remote access
✓ Database user follows least privilege principle (INSERT/SELECT/UPDATE/DELETE only)
✓ Strong input validation documentation with clear do/don't examples
✓ No hardcoded credentials in Python scripts
✓ No network exfiltration or C2 communication detected
✓ No obfuscation or encoded payloads found
✓ No sensitive file path access (ssh, aws credentials, etc.)
✓ Comprehensive security audit checklist in documentation
✓ Error messages do not leak database structure