扫描报告
5 /100
voice-interview-simulator
中文求职语音模拟面试器 — 使用 LLM 生成问题、ASR 转写回答、TTS 播报面试官语音,输出结构化评估报告
A legitimate Chinese voice interview simulator using LLM, ASR, and TTS APIs. No malicious behavior detected; all functionality is accurately documented and scoped.
可以安装
This skill is safe to use. No security concerns require action.
安全发现 1 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Loose dependency version pinning 供应链 | requirements.txt:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | scripts/run_interview.py:359 writes to OUTPUT_DIR/ |
| 网络访问 | READ | READ | ✓ 一致 | scripts/run_interview.py:295-315 POSTs to ASR/TTS APIs; scripts/run_interview.py… |
| 命令执行 | NONE | NONE | — | No subprocess, os.system, or shell execution found |
| 环境变量 | READ | READ | ✓ 一致 | scripts/run_interview.py:75-95 reads API keys from env vars; no key exfiltration |
| 技能调用 | NONE | NONE | — | No inter-skill invocation |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser access |
| 数据库 | NONE | NONE | — | No database access |
3 项发现
中危 外部 URL 外部 URL
https://models.audiozen.cn/v1 scripts/run_interview.py:83 中危 外部 URL 外部 URL
https://api.senseaudio.cn/v1/audio/transcriptions scripts/run_interview.py:89 中危 外部 URL 外部 URL
https://api.senseaudio.cn/v1/t2a_v2 scripts/run_interview.py:95 目录结构
6 文件 · 28.5 KB · 925 行 Python 1f · 511L
Markdown 3f · 409L
Text 1f · 3L
YAML 1f · 2L
├─
▾
agents
│ └─
openai.yaml
YAML
├─
▾
references
│ ├─
prompts_cn.md
Markdown
│ └─
state_schema_cn.md
Markdown
├─
▾
scripts
│ └─
run_interview.py
Python
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 3 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
openai | >=1.30.0 | pip | 否 | Lower-bounds pin only |
requests | >=2.31.0 | pip | 否 | Lower-bounds pin only |
python-dotenv | >=1.0.0 | pip | 否 | Lower-bounds pin only |
安全亮点
✓ SKILL.md accurately declares all three external API integrations (LLM, ASR, TTS) with their base URLs
✓ No subprocess, shell execution, or command injection found anywhere in the codebase
✓ No credential exfiltration — API keys are read from environment variables and used only for authentication to declared APIs
✓ No obfuscation techniques (no base64, eval, or dynamic code loading)
✓ No access to sensitive paths such as ~/.ssh, ~/.aws, .env, or secrets directories
✓ File writes are scoped to a dedicated outputs/ directory, not system paths
✓ No inter-skill invocation abuse or privilege escalation attempts
✓ Hardcoded fallback defaults (e.g., model names, base URLs) are documented in SKILL.md
✓ Environment variable access is targeted (specific keys), not a broad os.environ iteration
✓ No hidden instructions, HTML comments with payloads, or prompt injection vectors