Scan Report
42 /100
instreet-gomoku
InStreet五子棋AI。在InStreet桌游室进行五子棋对局时,自动计算最佳落子并提交。支持威胁检测,优先防守对手的活三/冲四。
Skill contains hardcoded API credentials and undeclared shell/network access with shadow functionality not reflected in documentation.
Use with caution
Remove hardcoded API key and replace with environment variable; declare all subprocess and network operations in SKILL.md; do not hardcode Windows-specific paths.
Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| High | Hardcoded API credential in source code Credential Theft | instreet_gomoku.py:12 |
| Medium | Undeclared subprocess shell execution Doc Mismatch | katagomo_simple.py:87 |
| Medium | Undeclared outbound network requests Doc Mismatch | gomoku_bot.py:32 |
| Medium | Hardcoded Windows-specific engine path Supply Chain | katagomo_simple.py:15 |
| Low | API key exposed in SKILL.md notes section Sensitive Access | SKILL.md:112 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | No file write operations found; temp file ops are in subprocess working dir only |
| Network | NONE | READ | ✗ Violation | instreet_gomoku.py:13-14, gomoku_bot.py:32-33 make urllib requests to instreet.c… |
| Shell | NONE | WRITE | ✗ Violation | katagomo_simple.py:87 subprocess.Popen executes external binary; gomoku_bot.py h… |
| Environment | NONE | READ | ✓ Aligned | gomoku_bot.py:13 reads INSTREET_API_KEY from os.environ (falls back to hardcoded… |
| Skill Invoke | NONE | NONE | — | No skill_invoke usage |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser usage |
| Database | NONE | NONE | — | No database access |
1 High 3 findings
High API Key 疑似硬编码凭证
API_KEY = 'sk_inst_adfe55c5fe69ca780201cb466bebbbce' instreet_gomoku.py:12 Medium External URL 外部 URL
https://instreet.coze.site/api/v1/games gomoku_bot.py:32 Medium External URL 外部 URL
https://instreet.coze.site/games/ gomoku_bot.py:359 File Tree
6 files · 58.1 KB · 1744 lines Python 3f · 1523L
Markdown 3f · 221L
├─
gomoku_bot.py
Python
├─
instreet_gomoku.py
Python
├─
katagomo_simple.py
Python
├─
publish-info.md
Markdown
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 4 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
numpy | unpinned | import | No | No requirements.txt; numpy imported but version not pinned |
subprocess | stdlib | stdlib | No | Standard library used to execute KataGomo engine |
urllib | stdlib | stdlib | No | Standard library used for HTTP API calls |
KataGomo gom15x_trt.exe | unknown | external binary | No | External Windows binary referenced by hardcoded path; not included in package |
Security Positives
✓ No obfuscation detected (no base64, eval, or anti-analysis techniques)
✓ No credential exfiltration or data theft behavior observed
✓ Network requests target a legitimate game API (instreet.coze.site) and are functionally necessary
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env files
✓ No persistence mechanisms (no cron, startup hooks, or backdoors)
✓ Subprocess usage is for a legitimate game engine (KataGomo GTP), not malicious command execution