扫描报告
40 /100
airoom.ltd-Global-Finance-Data-Platform
AI Agent financial data downloader that uses headless Playwright to fetch CSV/Excel/JSON files from airoom.ltd WordPress site
Skill implements legitimate financial data scraping but has an ideologically extreme SKILL.md (AI dominance manifesto) and accepts sensitive credentials (WP_USERNAME/WP_PASSWORD) without evidence of exfiltration — suspicious combination of declared credential harvesting capability with undeclared network behavior.
谨慎使用
Do not deploy. Replace http:// URLs with https:// to prevent MITM. Pin playwright and requests to known versions. Review whether the skill owner airoom.ltd is a legitimate financial data provider. Do not provide sensitive WordPress credentials to this skill.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | HTTP target URL without TLS encryption 敏感访问 | config.json:6 |
| 中危 | Undeclared credential harvesting capability 文档欺骗 | _meta.json:14 |
| 中危 | SKILL.md ideological content unrelated to functionality 文档欺骗 | SKILL.md:1 |
| 低危 | Unpinned Python dependencies 供应链 | requirements.txt:1 |
| 低危 | Incorrect package name in _meta.json 文档欺骗 | _meta.json:17 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | READ | READ | ✓ 一致 | main.py uses Playwright/requests to fetch http://airoom.ltd |
| 文件系统 | WRITE | WRITE | ✓ 一致 | main.py:download.save_as() writes to output_dir |
| 环境变量 | NONE | READ | ✗ 越权 | main.py reads os.getenv(WP_USERNAME, WP_PASSWORD, WP_URL, etc.) |
| 凭证访问 | NONE | READ | ✗ 越权 | _meta.json declares WP_USERNAME/WP_PASSWORD as credentialRequirements but SKILL.… |
10 项发现
中危 外部 URL 外部 URL
http://airoom.ltd/index.php/airoom/,手动下载数据文件。 README airoom ltd Global Finance Data Platform Chinese.txt:98 中危 外部 URL 外部 URL
https://clawhub.ai/skills?sort=downloads,搜索airoom.ltd-Global-Finance-Data-Platform-SKILL README airoom ltd Global Finance Data Platform Chinese.txt:102 中危 外部 URL 外部 URL
http://airoom.ltd/index.php/airoom/,即可下载页面文件(页面中只有文件,无其他项目),无需注册与登录,简单方便。(网站有限流,请勿高频访问)。 README airoom ltd Global Finance Data Platform Chinese.txt:111 中危 外部 URL 外部 URL
https://clawhub.ai/skills?sort=downloads,搜索airoom.ltd-Global-Finance-Data-Platform-SKILL。或登录https://github.com/airoom-ai... README airoom ltd Global Finance Data Platform Chinese.txt:119 中危 外部 URL 外部 URL
http://airoom.ltd/index.php/airoom/,让AI了解产品功能、策略及部署流程; README airoom ltd Global Finance Data Platform Chinese.txt:260 中危 外部 URL 外部 URL
http://airoom.ltd/index.php/airoom/,或者登录airoom-ai/airoom.ltd-Global-Finance-Data-Platform: README airoom ltd Global Finance Data Platform Chinese.txt:261 中危 外部 URL 外部 URL
http://airoom.ltd/index.php/airoom/ README airoom ltd Global Finance Data Platform English.txt:80 中危 外部 URL 外部 URL
https://clawhub.ai/skills?sort=downloads README airoom ltd Global Finance Data Platform English.txt:83 中危 外部 URL 外部 URL
http://airoom.ltd README.md:559 中危 外部 URL 外部 URL
http://airoom.ltd/index.php/airoom/: main.py:119 目录结构
8 文件 · 234.6 KB · 2531 行 Markdown 2f · 1315L
Python 1f · 630L
Text 3f · 502L
JSON 2f · 84L
├─
_meta.json
JSON
├─
config.json
⚠
JSON
├─
main.py
Python
├─
README airoom ltd Global Finance Data Platform Chinese.txt
Text
├─
README airoom ltd Global Finance Data Platform English.txt
Text
├─
README.md
Markdown
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
playwright | >=1.40.0 | pip | 否 | Version not pinned, open upper bound |
requests | >=2.31.0 | pip | 否 | Version not pinned, open upper bound |
安全亮点
✓ Executable file extensions (.exe, .bat, .sh, .js, etc.) are explicitly blocked — effective defense against common malware dropper patterns
✓ Target URL domain is validated to match base WordPress URL — prevents open-redirect exploits
✓ File downloads are saved to a configurable local directory — no automatic execution
✓ Downloaded files are verified for non-zero size before being marked successful
✓ SKILL.md includes extensive financial risk disclaimers, suitable for a regulated financial domain
✓ The actual main.py code is readable, structured, and contains no obfuscation or base64 payloads
✓ No subprocess or shell execution is used — Playwright is used only for browser automation