扫描报告
15 /100
rynjer-image-generation
Agent-first marketing image generation skill with prompt rewrite, cost estimation, and image generation via Rynjer API
A legitimate image generation skill for agents with no malicious behavior; only minor documentation and version pinning issues detected.
可以安装
Safe to use. Consider pinning package.json version and replacing the example credential placeholder in README.md with a clearer placeholder format.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Example credential placeholder in README 文档欺骗 | README.md:33 |
| 低危 | package.json version not formally pinned 供应链 | package.json:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | READ | READ | ✓ 一致 | src/mock-runtime.js:9-27 makes HTTPS requests to rynjer.com API |
| 文件系统 | READ | READ | ✓ 一致 | src/mock-runtime.js:5-6 reads tools.json and templates.json |
| 命令执行 | NONE | NONE | — | No shell execution found in codebase |
| 环境变量 | READ | READ | ✓ 一致 | src/mock-runtime.js:7-8 reads RYNJER_ACCESS_TOKEN, RYNJER_USE_LIVE, RYNJER_BASE_… |
| 技能调用 | READ | READ | ✓ 一致 | Skill exposes 5 tools: rewrite_image_prompt, estimate_image_cost, generate_image… |
| 剪贴板 | NONE | NONE | — | No clipboard access detected |
| 浏览器 | NONE | NONE | — | No browser automation detected |
| 数据库 | NONE | NONE | — | No database access detected |
1 高危 2 项发现
高危 API 密钥 疑似硬编码凭证
ACCESS_TOKEN="your_access_token_or_ryn_agent_v1_key" README.md:33 中危 外部 URL 外部 URL
https://rynjer.com README.md:32 目录结构
14 文件 · 44.7 KB · 1590 行 Markdown 9f · 893L
JavaScript 1f · 436L
JSON 4f · 261L
├─
▾
examples
│ └─
happy-path.json
JSON
├─
▾
src
│ ├─
mock-runtime.js
JavaScript
│ ├─
templates.json
JSON
│ └─
tools.json
JSON
├─
▾
templates
│ ├─
monetization-boundary.md
Markdown
│ ├─
routing-policy.md
Markdown
│ └─
use-cases.md
Markdown
├─
CHANGELOG.md
Markdown
├─
IMPLEMENTATION.md
Markdown
├─
package.json
JSON
├─
PUBLISH.md
Markdown
├─
README.md
Markdown
├─
SCHEMA.md
Markdown
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
none | N/A | builtin | 否 | Only uses Node.js built-in modules: https, fs, path - no external dependencies |
安全亮点
✓ No shell execution or command injection vulnerabilities detected
✓ No credential harvesting or environment variable enumeration for exfiltration
✓ No base64 decoding, eval(), or obfuscated code execution
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env, etc.)
✓ No C2 communication or data exfiltration patterns
✓ Uses only Node.js built-in modules (https, fs, path) - no supply chain risk
✓ API authentication uses Bearer token pattern for legitimate API calls only
✓ All capabilities are declared and aligned with documented behavior
✓ Skill uses mock mode by default, requiring explicit opt-in for live API calls
✓ No hidden functionality or undocumented behavior detected