扫描报告
22 /100
zhua-contributor
爪爪社区贡献系统 - 发布技能到skillhub、撰写文档、分享经验
This is a placeholder/template skill with benign shell scripts that list files and display information, but contains documentation mismatch (SKILL.md references non-existent scripts) and accesses a sensitive workspace path.
可以安装
Review the SKILL.md documentation accuracy. The referenced scripts (prep_skill.py, validate_skill.py, gen_docs.py, publish_skill.py) do not exist - only example.py and publish_all.sh are present. Verify this is intentional template content.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | SKILL.md references non-existent scripts 文档欺骗 | SKILL.md:47 |
| 低危 | Access to OpenClaw workspace path 敏感访问 | scripts/publish_all.sh:17 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | publish_all.sh accesses /root/.openclaw/workspace/ only for file listing and siz… |
| 网络访问 | NONE | NONE | — | No network requests found in any scripts |
| 命令执行 | NONE | NONE | — | Only uses bash for local file operations and echo statements |
| 环境变量 | NONE | NONE | — | No environment variable access detected |
目录结构
5 文件 · 5.7 KB · 211 行 Markdown 2f · 103L
Shell 1f · 65L
Text 1f · 24L
Python 1f · 19L
├─
▾
assets
│ └─
example_asset.txt
Text
├─
▾
references
│ └─
api_reference.md
Markdown
├─
▾
scripts
│ ├─
example.py
Python
│ └─
publish_all.sh
Shell
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
python3 | unspecified | system | 否 | Only used for placeholder example.py script |
安全亮点
✓ No credential harvesting or exfiltration detected
✓ No network requests to external IPs
✓ No base64-encoded commands or obfuscation
✓ No reverse shell or C2 communication
✓ The publish_all.sh script only performs read-only operations (file existence checks and size reporting)
✓ No supply chain risks - only standard libraries used in example.py
✓ Scripts are simple and easily auditable