扫描报告
25 /100
browser-automation
浏览器自动化操作与网页交互技能。用于自动填写表单、抓取网页数据、执行网页测试、模拟用户操作、批量处理网页任务。
A legitimate browser automation skill with one hardcoded billing API key, no hidden functionality, and documented capabilities matching implementation.
可以安装
Hardcode the BILLING_API_KEY is a supply-chain risk - it should be loaded from an environment variable. No other significant security concerns.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Hardcoded billing API key in source code 凭证窃取 | payment.py:12 |
| 中危 | All dependencies use unpinned >= version specifiers 供应链 | requirements.txt:1 |
| 低危 | Anti-detection techniques documented in reference files 文档欺骗 | references/anti-detection.md:130 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | scripts/web_scraper.py reads/writes JSON/CSV data files |
| 网络访问 | READ | READ | ✓ 一致 | All scripts use requests/playwright to fetch external URLs |
| 命令执行 | NONE | NONE | — | No subprocess or os.system calls found |
| 浏览器 | WRITE | WRITE | ✓ 一致 | Playwright automation in all scripts |
| 环境变量 | NONE | READ | ✓ 一致 | payment.py:95 reads SKILLPAY_USER_ID from os.environ |
| 技能调用 | NONE | NONE | — | No inter-skill invocation |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 数据库 | NONE | NONE | — | No direct database access |
2 高危 8 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY = "sk_f03aa8f8bbcf79f7aa11c112d904780f22e62add1464e3c41a79600a451eb1d2" payment.py:12 高危 IP 地址 硬编码 IP 地址
120.0.0.0 references/anti-detection-guide.md:49 中危 外部 URL 外部 URL
https://search.jd.com/Search?keyword=iPhone SKILL.md:100 中危 外部 URL 外部 URL
https://skillpay.me payment.py:11 中危 外部 URL 外部 URL
https://target-site.com references/anti-detection-guide.md:177 中危 外部 URL 外部 URL
http://2captcha.com/in.php references/automation-patterns.md:416 中危 外部 URL 外部 URL
http://2captcha.com/res.php?key= references/automation-patterns.md:427 中危 外部 URL 外部 URL
https://hooks.slack.com/... scripts/page_monitor.py:13 目录结构
14 文件 · 82.9 KB · 3051 行 Markdown 6f · 1781L
Python 6f · 1230L
Text 1f · 21L
JSON 1f · 19L
├─
▾
references
│ ├─
anti-detection-guide.md
Markdown
│ ├─
anti-detection.md
Markdown
│ ├─
automation-patterns.md
Markdown
│ ├─
browser-tools-reference.md
Markdown
│ └─
playwright-guide.md
Markdown
├─
▾
scripts
│ ├─
auto_login.py
Python
│ ├─
data_scraper.py
Python
│ ├─
form_filler.py
Python
│ ├─
page_monitor.py
Python
│ └─
web_scraper.py
Python
├─
_meta.json
JSON
├─
payment.py
Python
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 5 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
playwright | >=1.40.0 | pip | 否 | Version not pinned |
selenium | >=4.15.0 | pip | 否 | Version not pinned |
requests | >=2.31.0 | pip | 否 | Version not pinned |
beautifulsoup4 | >=4.12.0 | pip | 否 | Version not pinned |
pandas | >=2.0.0 | pip | 否 | Version not pinned |
安全亮点
✓ No subprocess, os.system, or shell execution calls - no arbitrary code execution risk
✓ No base64 encoding or obfuscation of any kind
✓ No hidden functionality - all scripts match SKILL.md documentation
✓ SKILL.md accurately declares the skill as a browser automation tool with no overstated capabilities
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env, ~/.git-credentials)
✓ No data exfiltration or C2 communication beyond declared billing endpoints
✓ No credential harvesting beyond the skill's own declared billing API key
✓ No persistence mechanisms (no cron jobs, startup scripts, or backdoor installation)
✓ Payment system properly declared in _meta.json with pricing details