扫描报告
5 /100
stella-selfie
Generate persona-consistent selfie images using AI providers and send to OpenClaw channels
Legitimate image generation skill with proper capability declarations. The flagged base64 operations are standard API response decoding for image data, not code obfuscation.
可以安装
Skill is safe to use. No security concerns identified.
安全发现 1 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Minor capability over-declaration | SKILL.md:7 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ,WRITE | READ,WRITE | ✓ 一致 | SKILL.md, scripts/skill.ts:117 - reads IDENTITY.md, avatars; writes to ~/.opencl… |
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md line 166 - calls Google Gemini API, fal API, laozhang.ai API |
| 命令执行 | WRITE | WRITE | ✓ 一致 | scripts/sender.ts:51 - executes openclaw message send CLI |
| 环境变量 | READ | READ | ✓ 一致 | GEMINI_API_KEY, FAL_KEY, LAOZHANG_API_KEY - all declared in SKILL.md metadata |
2 严重 6 项发现
严重 编码执行 Base64 编码执行(代码混淆)
Buffer.from(blob.data, "base64" scripts/providers/gemini.ts:198 严重 编码执行 Base64 编码执行(代码混淆)
Buffer.from(raw, "base64" scripts/providers/laozhang.ts:227 中危 外部 URL 外部 URL
https://api.laozhang.ai SKILL.md:166 中危 外部 URL 外部 URL
https://cdn.example.com/ref1.jpg SKILL.md:232 中危 外部 URL 外部 URL
https://cdn.example.com/ref2.jpg SKILL.md:232 中危 外部 URL 外部 URL
https://api.laozhang.ai/v1beta/models scripts/providers/laozhang.ts:6 目录结构
12 文件 · 79.5 KB · 2381 行 TypeScript 8f · 1801L
Markdown 2f · 520L
JSON 2f · 60L
├─
▾
references
│ └─
timeline-integration.md
Markdown
├─
▾
scripts
│ ├─
▾
providers
│ │ ├─
fal.ts
TypeScript
│ │ ├─
gemini.ts
TypeScript
│ │ └─
laozhang.ts
TypeScript
│ ├─
avatars.ts
TypeScript
│ ├─
errors.ts
TypeScript
│ ├─
identity.ts
TypeScript
│ ├─
sender.ts
TypeScript
│ └─
skill.ts
TypeScript
├─
package.json
JSON
├─
SKILL.md
Markdown
└─
tsconfig.json
JSON
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
@google/genai | ^0.7.0 | npm | 否 | Official Google SDK |
@fal-ai/client | ^1.2.0 | npm | 否 | Official fal.ai SDK |
安全亮点
✓ All API calls documented with data flow in SKILL.md External Endpoints section
✓ Credential requirements explicitly declared in metadata.openclaw.requires.env
✓ No credential harvesting or exfiltration detected
✓ Base64 operations are standard image decoding from typed API responses, not code obfuscation
✓ Filesystem writes are scoped to designated workspace directory ~/.openclaw/workspace/
✓ No remote script execution (curl|bash patterns)
✓ No sensitive path access (~/.ssh, ~/.aws, .env)
✓ Shell execution limited to OpenClaw CLI for message delivery only