扫描报告
15 /100
purchase_record
采购记录管理 - 自动将采购信息写入 Excel
Legitimate purchase record management tool with minor security concerns (hardcoded paths, exec() usage) but no malicious behavior detected.
可以安装
Consider pinning openpyxl version and documenting the shell:WRITE permission in SKILL.md for transparency.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Undeclared shell execution via exec() | scripts/index.js:15 |
| 低危 | Hardcoded absolute paths | scripts/index.js:4 |
| 提示 | Unpinned dependency | scripts/record.py:5 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | openpyxl load_workbook/save to desktop path |
| 命令执行 | NONE | WRITE | ✓ 一致 | scripts/index.js:15 exec() with python command |
| 网络访问 | NONE | NONE | — | No network requests found |
| 环境变量 | NONE | NONE | — | No environment variable access |
| 技能调用 | NONE | NONE | — | No cross-skill invocation |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser access |
| 数据库 | NONE | NONE | — | No database access |
目录结构
10 文件 · 16.7 KB · 569 行 Python 3f · 332L
JavaScript 3f · 175L
Markdown 2f · 60L
JSON 2f · 2L
├─
▾
scripts
│ ├─
add_purchase.js
JavaScript
│ ├─
add_purchase.py
Python
│ ├─
index.js
JavaScript
│ ├─
main.py
Python
│ ├─
record.py
Python
│ └─
test.js
JavaScript
├─
config.json
⚠
JSON
├─
package.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
openpyxl | unspecified | pip | 否 | Version not pinned in requirements.txt |
exceljs | unspecified | npm | 否 | Version not pinned in package.json |
安全亮点
✓ No network requests or data exfiltration detected
✓ No credential harvesting or sensitive path access
✓ No base64-encoded payloads or obfuscated code
✓ No curl|bash or remote script execution
✓ Input sanitization present (quote escaping in exec())
✓ Legitimate use case: local Excel file manipulation only