Scan Report
20 /100
novel-scraper
智能小说抓取工具,支持自动翻页、分页补全、章节号自动解析
Legitimate novel scraping tool with minor documentation gaps regarding subprocess shell execution.
Safe to install
Consider explicitly documenting subprocess shell execution in SKILL.md capability declaration. Otherwise safe for use.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | Subprocess shell execution not explicitly declared Doc Mismatch | scripts/scraper_v5.py:59 |
| Low | Dangerous command in documentation Doc Mismatch | SKILL.md:149 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | Writes to ~/.openclaw/workspace/novels/ |
| Network | READ | READ | ✓ Aligned | Uses curl to fetch bqquge.com novel content |
| Shell | NONE | WRITE | ✓ Aligned | subprocess.run(['curl', ...]) in scripts/scraper_v5.py:59 and scripts/scraper.py… |
1 Critical 5 findings
Critical Dangerous Command 危险 Shell 命令
rm -rf / SKILL.md:149 Medium External URL 外部 URL
https://www.bqquge.com/4/1962 SKILL.md:58 Medium External URL 外部 URL
https://www.bqquge.com/4/1963 SKILL.md:58 Medium External URL 外部 URL
https://www.bqquge.com scripts/fetch_catalog.py:49 Medium External URL 外部 URL
https://www.bqquge.com/ scripts/fetch_catalog.py:66 File Tree
11 files · 77.1 KB · 2220 lines Python 5f · 1887L
Markdown 3f · 304L
JSON 2f · 24L
Text 1f · 5L
├─
▾
configs
│ └─
sites.json
JSON
├─
▾
scripts
│ ├─
extract_urls.py
Python
│ ├─
fetch_catalog.py
Python
│ ├─
merge_novels.py
Python
│ ├─
scraper_v5.py
Python
│ └─
scraper.py
Python
├─
_meta.json
JSON
├─
CHANGELOG.md
Markdown
├─
RELEASE_NOTES.md
Markdown
├─
requirements.txt
Text
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
beautifulsoup4 | >=4.12.0 | pip | No | Properly pinned minimum version |
bs4 | >=0.0.1 | pip | No | Alias package, acceptable |
Security Positives
✓ All network requests target legitimate novel websites (bqquge.com)
✓ No credential harvesting or environment variable access
✓ No data exfiltration or C2 communication
✓ No obfuscated code or base64 execution
✓ Dependencies properly declared in requirements.txt
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ Explicit URL validation and safety checks present