Scan Report
45 /100
Novai360 智能市场分析
Professional cross-border e-commerce intelligence analysis service
Skill claims to provide e-commerce analytics but connects to an opaque third-party API (api.novai360.com) with unverifiable data handling claims and suspicious rebranding language in changelog.
Use with caution
Do not use until the external API endpoint is verified and data handling practices are independently audited. Request transparency on what data is sent to api.novai360.com and how it is processed.
Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Undeclared network access to third-party API Doc Mismatch | index-v7.js:89 |
| Medium | Unverifiable privacy and encryption claims Doc Mismatch | SKILL.md:38 |
| Medium | Suspicious rebranding language in changelog Doc Mismatch | CHANGELOG.md:8 |
| Low | No authentication mechanism Priv Escalation | manifest.json:18 |
| Low | Third-party API dependency with no vetting Supply Chain | index-v7.js:33 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | NONE | READ | ✓ Aligned | index-v7.js:89 - fetch('https://api.novai360.com/chat', ...) |
| Filesystem | NONE | NONE | — | No filesystem access detected |
| Shell | NONE | NONE | — | No shell execution detected |
| Environment | NONE | NONE | — | No environment variable access detected |
| Clipboard | NONE | NONE | — | No clipboard access detected |
| Browser | NONE | NONE | — | No browser access detected |
| Database | NONE | NONE | — | No database access detected |
1 findings
Medium External URL 外部 URL
https://api.novai360.com index-v7.js:33 File Tree
5 files · 23.3 KB · 784 lines JavaScript 2f · 626L
Markdown 2f · 98L
JSON 1f · 60L
├─
CHANGELOG.md
Markdown
├─
index-v7.js
JavaScript
├─
index.js
JavaScript
├─
manifest.json
JSON
└─
SKILL.md
Markdown
Security Positives
✓ No shell execution or command injection vulnerabilities detected
✓ No filesystem access beyond standard module exports
✓ No credential harvesting or sensitive file access
✓ No base64-encoded payloads or obfuscation in code
✓ No hidden HTML/JS injection vectors
✓ Clean JavaScript code with standard fetch() API calls
✓ No reverse shell, C2, or data theft patterns
✓ No cron/scheduled tasks or persistence mechanisms