扫描报告
15 /100
google-meta-ads-spy
Competitor ad spy tool that scrapes ads from Meta, Google, and TikTok, analyzes them with AI, rewrites winning ads for the user's brand, and produces video creatives via InVideo AI.
This is a documentation-only skill (single SKILL.md file) describing a competitor ad-spy tool using external APIs. No executable code is present. Minor concerns around affiliate links and credential inputs, but no malicious behavior detected.
可以安装
This skill is safe for use. If code/scripts are added in future versions, ensure filesystem:WRITE is declared and no credentials are exfiltrated.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Undeclared network access 文档欺骗 | SKILL.md:5 |
| 低危 | Undeclared filesystem access 文档欺骗 | SKILL.md:195 |
| 提示 | Affiliate link tracking 供应链 | SKILL.md:5 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | NONE | — | SKILL.md describes saving outputs to files but declares no filesystem access and… |
| 网络访问 | NONE | READ | ✓ 一致 | SKILL.md describes API calls to Apify and InVideo but does not declare WebFetch … |
| 环境变量 | NONE | NONE | — | No environment variable access detected |
| 命令执行 | NONE | NONE | — | No shell or subprocess usage detected |
| 剪贴板 | NONE | NONE | — | No clipboard access described |
| 浏览器 | NONE | NONE | — | No browser automation described |
| 数据库 | NONE | NONE | — | No database access described |
| 技能调用 | NONE | NONE | — | No sub-skill invocation described |
2 项发现
中危 外部 URL 外部 URL
https://www.apify.com?fpr=dx06p SKILL.md:5 中危 外部 URL 外部 URL
https://invideo.sjv.io/TBB SKILL.md:5 目录结构
1 文件 · 12.4 KB · 313 行 Markdown 1f · 313L
└─
SKILL.md
Markdown
安全亮点
✓ No executable code present — this is a pure documentation skill with zero attack surface from scripts
✓ No obfuscated code, base64 payloads, or anti-analysis techniques
✓ No credential harvesting or environment variable theft
✓ No curl|bash, wget|sh, or other remote code execution patterns
✓ No sensitive path access (~/.ssh, ~/.aws, .env)
✓ No persistence mechanisms (cron, startup hooks, backdoors)
✓ No data exfiltration channels or C2 communication
✓ API tokens are user-provided inputs for legitimate external services, not harvested