扫描报告
10 /100
page-agent
Enhanced browser DOM manipulation using PageAgent's page-controller. Injects into any web page via CDP to provide precise DOM extraction, element detection, and interaction simulation.
This is a legitimate browser automation skill that injects Alibaba's PageController library into web pages via CDP for DOM manipulation. No malicious behavior, credential theft, or hidden functionality was found.
可以安装
Approve for use. The skill is well-documented and performs its stated purpose of enhanced browser DOM manipulation without any security violations.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Missing package.json with pinned dependencies 供应链 | scripts/inject-via-cdp.sh:26 |
| 提示 | SKILL.md omits shell:WRITE usage 文档欺骗 | SKILL.md:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | NONE | — | No filesystem access in any script — all file reads are local script loading wit… |
| 网络访问 | NONE | READ | ✓ 一致 | inject-cdp.mjs:13 — connects to http://127.0.0.1:18800 for CDP protocol; this is… |
| 命令执行 | NONE | WRITE | ✓ 一致 | inject-via-cdp.sh:6 — runs `node -e` with inline JS; this is documented browser … |
| 浏览器 | browser:WRITE | WRITE | ✓ 一致 | All scripts inject JavaScript into browser pages via CDP, performing DOM manipul… |
| 技能调用 | NONE | NONE | — | No skill-to-skill invocation found |
1 项发现
中危 外部 URL 外部 URL
http://127.0.0.1:18800 scripts/inject-cdp.mjs:9 目录结构
6 文件 · 151.1 KB · 4279 行 JavaScript 4f · 4122L
Markdown 1f · 93L
Shell 1f · 64L
├─
▾
scripts
│ ├─
inject-cdp.mjs
JavaScript
│ ├─
inject-via-cdp.sh
Shell
│ ├─
inject.js
JavaScript
│ ├─
page-controller-global.js
JavaScript
│ └─
page-controller.js
JavaScript
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
ws | * | npm (referenced but not declared in package.json) | 否 | Referenced in inject-via-cdp.sh but no package.json exists to pin or track this dependency |
安全亮点
✓ All code is human-readable with no obfuscation, base64 encoding, or anti-analysis patterns
✓ No credential harvesting, environment variable enumeration, or sensitive file access
✓ No data exfiltration or C2 communication — all network activity is localhost CDP only
✓ Library code is from the well-known alibaba/page-agent open-source project (v1.5.6)
✓ SKILL.md accurately describes the functionality and usage workflow
✓ No reverse shell, arbitrary code execution, or privilege escalation mechanisms present
✓ The execJS() method is declared in SKILL.md and represents legitimate browser automation
✓ Both page-controller files use standard DOM APIs with no malicious extensions
✓ No supply_chain typosquatting indicators or malicious dependency patterns detected