扫描报告
20 /100
requirement-checker
需求文档规范自动检查技能(AI 驱动 + 智能引导)— LLM-powered requirement document validator
A legitimate requirement document checker that uses LLM APIs to validate documents. No malicious behavior detected. The primary concern is a hardcoded API key stored in config.json which is used locally for API calls rather than exfiltrated.
可以安装
Move the hardcoded API key from config.json to environment variables or prompt for it at runtime. Add config.json to .gitignore to prevent credential leakage.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Hardcoded API Key in config.json | config.json:27 |
| 低危 | Environment variable access not declared | scripts/check_with_llm.py:74 |
| 低危 | Reads OpenClaw user config for API credentials | scripts/check_with_llm.py:113 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | WRITE | ✓ 一致 | Reads requirement docs, writes reports to output dir — necessary for the feature |
| 网络访问 | READ | READ | ✓ 一致 | Makes POST requests to configured LLM API (dashscope) for document checking only |
| 环境变量 | NONE | READ | ✓ 一致 | Reads OPENAI_API_KEY, OPENAI_BASE_URL from env; not declared in SKILL.md but ben… |
| 命令执行 | NONE | NONE | — | No subprocess or shell execution found in codebase |
| 技能调用 | WRITE | WRITE | ✓ 一致 | Uses sessions_spawn with subagent runtime as documented in SKILL.md |
1 高危 8 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY="your-api-key-here" README.md:121 中危 外部 URL 外部 URL
https://coding.dashscope.aliyuncs.com/v1 OPTIMIZATION_SUMMARY.md:137 中危 外部 URL 外部 URL
https://clawhub.ai README.md:411 中危 外部 URL 外部 URL
https://docs.openclaw.ai README.md:412 中危 外部 URL 外部 URL
https://discord.com/invite/clawd README.md:413 中危 外部 URL 外部 URL
https://dashscope.aliyuncs.com/compatible-mode/v1 generate_gwt_llm.py:33 中危 外部 URL 外部 URL
https://www.figma.com/file/xxx references/templates.md:90 中危 外部 URL 外部 URL
https://coding.dashscope.aliyuncs.com/v1): scripts/check_with_llm.py:268 目录结构
22 文件 · 244.0 KB · 7244 行 Python 14f · 5426L
Markdown 6f · 1690L
Shell 1f · 91L
JSON 1f · 37L
├─
▾
references
│ ├─
checklist.md
Markdown
│ ├─
llm-enhanced.md
Markdown
│ └─
templates.md
Markdown
├─
▾
scripts
│ ├─
batch_check_ai.py
Python
│ ├─
batch_check_with_agent.py
Python
│ ├─
batch_check.py
Python
│ ├─
check_requirement_agent.py
Python
│ ├─
check_requirement_enhanced.py
Python
│ ├─
check_requirement_llm.py
Python
│ ├─
check_requirement.py
Python
│ ├─
check_with_llm.py
Python
│ ├─
generate_gwt.py
Python
│ ├─
parse_requirement.py
Python
│ └─
test_config.py
Python
├─
check_requirement.py
Python
├─
config.json
⚠
JSON
├─
generate_gwt_llm.py
Python
├─
generate_gwt_with_llm.py
Python
├─
OPTIMIZATION_SUMMARY.md
Markdown
├─
README.md
Markdown
├─
setup_api.sh
Shell
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | not pinned | pip | 否 | requests library used for LLM API calls; version not pinned in requirements |
python-docx | not pinned | pip | 否 | Optional dependency for Word document parsing; version not pinned |
安全亮点
✓ No subprocess, shell execution, or command injection found
✓ No base64-encoded payloads or eval/exec patterns
✓ No credential exfiltration — API key stays local and is sent only to configured LLM endpoint
✓ No access to sensitive system paths (~/.ssh, ~/.aws, .env)
✓ No reverse shell, C2 communication, or data theft patterns
✓ Uses sessions_spawn with subagent runtime as documented in SKILL.md
✓ No suspicious download or remote script execution (no curl|bash or wget|sh)
✓ All network requests go to the configured LLM API endpoint only