扫描报告
20 /100
stock-monitor
全功能智能股票监控预警系统 — Chinese A-share stock monitor with 7 alert rules, AI analysis (Kimi/DeepSeek), and trading signal generation
Legitimate stock monitoring tool with no malicious behavior, but SKILL.md omits shell execution and filesystem write permissions required for daemon operation.
可以安装
Update SKILL.md to declare shell:WRITE (for control.sh daemon management), filesystem:WRITE (for PID/log files at ~/.stock_monitor/), and document the network API endpoints used.
安全发现 6 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Shell execution not declared in SKILL.md 文档欺骗 | cron_check.py:35 |
| 中危 | Undeclared filesystem WRITE for daemon persistence 权限提升 | monitor_daemon.py:16 |
| 低危 | Undeclared network endpoints 文档欺骗 | ai_analyser.py, analyser.py, monitor.py:20 |
| 低危 | Undeclared environment variable access 文档欺骗 | ai_analyser.py:14 |
| 低危 | Unpinned requests library dependency 供应链 | ai_analyser.py:5 |
| 提示 | Placeholder credential pattern in VERSIONS.md 文档欺骗 | VERSIONS.md:29 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md describes AI API calls; ai_analyser.py calls moonshot.cn/deepseek.com |
| 命令执行 | NONE | WRITE | ✗ 越权 | cron_check.py:18 subprocess with shell=True; control.sh:25 nohup python3 backgro… |
| 文件系统 | NONE | WRITE | ✗ 越权 | monitor_daemon.py:15 writes to ~/.stock_monitor/monitor.log; control.sh:22 creat… |
| 环境变量 | NONE | READ | ✗ 越权 | ai_analyser.py:14 reads KIMI_API_KEY from os.environ.get('KIMI_API_KEY') |
| 剪贴板 | NONE | NONE | — | N/A |
| 浏览器 | NONE | NONE | — | N/A |
| 数据库 | NONE | NONE | — | N/A |
| 技能调用 | NONE | NONE | — | N/A |
1 高危 13 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY="your-kimi-api-key" VERSIONS.md:29 中危 外部 URL 外部 URL
https://api.moonshot.cn/v1/chat/completions ai_analyser.py:20 中危 外部 URL 外部 URL
https://api.deepseek.com/v1/chat/completions ai_analyser.py:21 中危 外部 URL 外部 URL
https://searchapi.eastmoney.com/api/suggest/get analyser.py:26 中危 外部 URL 外部 URL
https://search.sina.com.cn/?q= analyser.py:49 中危 外部 URL 外部 URL
https://quotes.sina.cn/cn/api/quotes.php?symbol= analyser.py:93 中危 外部 URL 外部 URL
https://push2.eastmoney.com/api/qt/stock/get analyser.py:108 中危 外部 URL 外部 URL
http://datacenter-web.eastmoney.com/api/data/v1/get analyser.py:123 中危 外部 URL 外部 URL
https://push2his.eastmoney.com/api/qt/stock/kline/get monitor.py:110 中危 外部 URL 外部 URL
https://hq.sinajs.cn/list= monitor.py:258 中危 外部 URL 外部 URL
https://finance.sina.com.cn monitor.py:260 中危 外部 URL 外部 URL
https://hq.sinajs.cn/list=hf_XAU monitor.py:299 中危 外部 URL 外部 URL
https://emweb.securities.eastmoney.com/PC_HSF10/CompanySurvey/CompanySurveyAjax monitor.py:496 目录结构
12 文件 · 72.3 KB · 2046 行 Python 6f · 1562L
Markdown 3f · 371L
Shell 1f · 64L
JSON 2f · 49L
├─
_meta.json
JSON
├─
ai_analyser.py
Python
├─
analyser.py
Python
├─
control.sh
Shell
├─
cron_check.py
Python
├─
monitor_daemon.py
Python
├─
monitor.py
Python
├─
package.json
JSON
├─
README.md
Markdown
├─
SKILL.md
Markdown
├─
test_suite.py
Python
└─
VERSIONS.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | unpinned | implicit import | 否 | No requirements.txt; requests imported but version unconstrained |
安全亮点
✓ No base64-encoded execution, reverse shell, or C2 communication patterns detected
✓ No access to ~/.ssh, ~/.aws, .env, or other credential storage paths
✓ No curl|bash or wget|sh remote script execution
✓ No data exfiltration channels to unknown external IPs
✓ No prompt injection instructions or jailbreak payloads
✓ No obfuscated code (eval, atob, hex-encoded strings)
✓ No cron persistence mechanisms beyond the control script's PID file
✓ All network traffic goes to legitimate, well-known Chinese financial data providers (Sina, Eastmoney, Moonshot, DeepSeek)
✓ AI API calls are purpose-appropriate (investment analysis), with the API key read only from environment variables
✓ The subprocess call in cron_check.py is limited to invoking the known openclaw CLI tool, not arbitrary shell commands