可疑 — 风险评分 45/100
上次扫描:2 天前 重新扫描
45 /100
swarm-control-feishu
Multi-agent cluster management with Feishu integration
Skill documents dangerous curl|bash installation patterns and configures maximum-permissive OpenClaw settings that disable all security controls, enabling arbitrary shell execution and full filesystem/network access.
技能名称swarm-control-feishu
分析耗时37.7s
引擎pi
谨慎使用
Review installation commands in SKILL.md; do not apply 'full permission' configurations unless in fully isolated environments; enable sandbox mode and restrict exec permissions.

攻击链 3 步

入口 User reads SKILL.md and follows installation instructions
SKILL.md:842
提权 Skill applies maximum-permissive configuration disabling all security controls
feishu-allallow.js:145
影响 Agent can execute arbitrary shell commands, access entire filesystem, read all sessions
config.example.json:58

安全发现 6 项

严重性 安全发现 位置
高危
Dangerous curl|bash pattern in documentation
SKILL.md line 842 documents remote script execution via curl|bash pattern for nvm installation. This pattern is a well-known attack vector.
curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.0/install.sh | bash
→ Use safer installation methods or document security implications prominently
SKILL.md:842
高危
All security controls intentionally disabled
The skill applies configurations that disable sandbox, set exec.security to 'full', exec.ask to 'off', and workspaceOnly to false, eliminating all protective measures.
"sandbox":{"mode":"off"},"exec":{"security":"full","ask":"off"},"fs":{"workspaceOnly":false}
→ Document security implications clearly; consider safer defaults
config.example.json:58
中危
Gateway bound to LAN
Gateway bind=lan exposes OpenClaw to local network instead of localhost, increasing attack surface.
"gateway":{"bind":"lan"}
→ Use bind:loopback for single-user scenarios
config.example.json:70
中危
Elevated privileges enabled without restrictions
elevated.enabled:true allows privileged operations from Feishu with minimal controls.
"elevated":{"enabled":true}
→ Restrict elevated access or document security implications
config.example.json:64
低危
Docker pulls from third-party registry
start-funasr.sh pulls Docker image from Aliyun registry (registry.cn-hangzhou.aliyuncs.com)
registry.cn-hangzhou.aliyuncs.com/funasr_repo/funasr:funasr-runtime-sdk-cpu-0.4.5
→ Verify registry authenticity before use
start-funasr.sh:25
低危
Node.js execSync usage for status checks
JavaScript files use child_process.execSync for environment detection and status checks.
execSync('docker --version', { stdio: 'pipe' });
→ No action needed - legitimate tool inspection
feishu-allallow.js:61
资源类型声明权限推断权限状态证据
命令执行 NONE WRITE ✗ 越权 feishu-allallow.js:12 uses execSync for command execution
文件系统 NONE WRITE ✗ 越权 config modifies ~/.openclaw/openclaw.json
网络访问 NONE WRITE ✗ 越权 gateway.bind:lan exposes to LAN; Docker pulls remote images
1 严重 12 项发现
💀
严重 危险命令 危险 Shell 命令
curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.0/install.sh | bash
SKILL.md:842
🔗
中危 外部 URL 外部 URL
https://clawhub.com
CHANGELOG.md:101
🔗
中危 外部 URL 外部 URL
https://docs.openclaw.ai
FILES.md:139
🔗
中危 外部 URL 外部 URL
https://open.feishu.cn/
FILES.md:140
🔗
中危 外部 URL 外部 URL
http://127.0.0.1:18789
JSON_CONFIG_GUIDE.md:302
🔗
中危 外部 URL 外部 URL
https://api.kimi.com/coding/
JSON_CONFIG_GUIDE.md:328
🔗
中危 外部 URL 外部 URL
https://www.modelscope.cn/models/manyeyes/sensevoice-small-int8-onnx/summary
SKILL.md:589
🔗
中危 外部 URL 外部 URL
https://nodejs.org/en/download/
SKILL.md:971
🔗
中危 外部 URL 外部 URL
https://www.python.org/downloads/
SKILL.md:977
🔗
中危 外部 URL 外部 URL
https://f-droid.org/packages/com.termux/
SKILL.md:1012
🔗
中危 外部 URL 外部 URL
http://json-schema.org/draft-07/schema#
schema.json:2
🔗
中危 外部 URL 外部 URL
https://www.modelscope.cn/models/manyeyes/sensevoice-small-int8-onnx
start-funasr.sh:27

目录结构

14 文件 · 112.9 KB · 4148 行
Markdown 6f · 2296L JavaScript 3f · 1171L JSON 4f · 622L Shell 1f · 59L
├─ 📝 CHANGELOG.md Markdown 107L · 3.4 KB
├─ 📋 config.example.annotated.json JSON 188L · 4.8 KB
├─ 📋 config.example.json JSON 134L · 2.6 KB
├─ 📜 feishu-allallow.js JavaScript 498L · 13.3 KB
├─ 📜 feishu-prime.js JavaScript 513L · 13.8 KB
├─ 📝 FILES.md Markdown 142L · 4.2 KB
├─ 📝 JSON_CONFIG_GUIDE.md Markdown 550L · 11.7 KB
├─ 📋 package.json JSON 83L · 2.5 KB
├─ 📝 README.md Markdown 146L · 4.7 KB
├─ 📝 RELEASE.md Markdown 182L · 3.9 KB
├─ 📋 schema.json JSON 217L · 5.8 KB
├─ 📝 SKILL.md Markdown 1169L · 36.2 KB
├─ 🔧 start-funasr.sh Shell 59L · 1.7 KB
└─ 📜 swarm-control-feishu.js JavaScript 160L · 4.3 KB

安全亮点

✓ No actual malicious code execution in runtime - curl|bash only in documentation
✓ No credential harvesting or exfiltration code detected
✓ No reverse shell or C2 infrastructure
✓ No base64-encoded or obfuscated malicious payloads
✓ execSync usage limited to benign status/version checks
✓ Configuration files are template-based, not automatically applied