低风险 — 风险评分 10/100
上次扫描:1 天前 重新扫描
10 /100
page-agent
Enhanced browser DOM manipulation using PageAgent's page-controller. Injects into any web page via CDP to provide precise DOM extraction, element detection, and interaction simulation.
This is a legitimate browser automation skill that injects Alibaba's PageController library into web pages via CDP for DOM manipulation. No malicious behavior, credential theft, or hidden functionality was found.
技能名称page-agent
分析耗时31.9s
引擎pi
可以安装
Approve for use. The skill is well-documented and performs its stated purpose of enhanced browser DOM manipulation without any security violations.

安全发现 2 项

严重性 安全发现 位置
低危
Missing package.json with pinned dependencies 供应链
inject-via-cdp.sh uses the `ws` WebSocket npm package but no package.json or requirements.txt is present in the skill. The `ws` package is a standard CDP dependency but should be explicitly declared and version-pinned.
const WebSocket = require('ws');
→ Add a package.json with { "ws": "^8.0.0" } declared as a dependency
scripts/inject-via-cdp.sh:26
提示
SKILL.md omits shell:WRITE usage 文档欺骗
SKILL.md documents the inject-cdp.mjs usage but does not mention that the skill also provides inject-via-cdp.sh which uses Bash with node -e execution. This is a minor documentation gap.
bash ~/.openclaw/workspace/skills/page-agent/scripts/inject-cdp.mjs
→ Document that inject-via-cdp.sh exists as an alternative shell-based injection method
SKILL.md:1
资源类型声明权限推断权限状态证据
文件系统 NONE NONE No filesystem access in any script — all file reads are local script loading wit…
网络访问 NONE READ ✓ 一致 inject-cdp.mjs:13 — connects to http://127.0.0.1:18800 for CDP protocol; this is…
命令执行 NONE WRITE ✓ 一致 inject-via-cdp.sh:6 — runs `node -e` with inline JS; this is documented browser …
浏览器 browser:WRITE WRITE ✓ 一致 All scripts inject JavaScript into browser pages via CDP, performing DOM manipul…
技能调用 NONE NONE No skill-to-skill invocation found
1 项发现
🔗
中危 外部 URL 外部 URL
http://127.0.0.1:18800
scripts/inject-cdp.mjs:9

目录结构

6 文件 · 151.1 KB · 4279 行
JavaScript 4f · 4122L Markdown 1f · 93L Shell 1f · 64L
├─ 📁 scripts
│ ├─ 📜 inject-cdp.mjs JavaScript 53L · 1.9 KB
│ ├─ 🔧 inject-via-cdp.sh Shell 64L · 1.6 KB
│ ├─ 📜 inject.js JavaScript 62L · 1.6 KB
│ ├─ 📜 page-controller-global.js JavaScript 2002L · 71.0 KB
│ └─ 📜 page-controller.js JavaScript 2005L · 71.0 KB
└─ 📝 SKILL.md Markdown 93L · 4.0 KB

依赖分析 1 项

包名版本来源已知漏洞备注
ws * npm (referenced but not declared in package.json) Referenced in inject-via-cdp.sh but no package.json exists to pin or track this dependency

安全亮点

✓ All code is human-readable with no obfuscation, base64 encoding, or anti-analysis patterns
✓ No credential harvesting, environment variable enumeration, or sensitive file access
✓ No data exfiltration or C2 communication — all network activity is localhost CDP only
✓ Library code is from the well-known alibaba/page-agent open-source project (v1.5.6)
✓ SKILL.md accurately describes the functionality and usage workflow
✓ No reverse shell, arbitrary code execution, or privilege escalation mechanisms present
✓ The execJS() method is declared in SKILL.md and represents legitimate browser automation
✓ Both page-controller files use standard DOM APIs with no malicious extensions
✓ No supply_chain typosquatting indicators or malicious dependency patterns detected