Scan Report
45 /100
stock-prediction
自动化股票预测工作流
Skill executes undeclared shell commands via subprocess with hardcoded Administrator paths, posing significant risk of unintended system modification.
Use with caution
This skill should either be rejected or require explicit user confirmation before any shell command execution. The hardcoded C:\Users\Administrator paths indicate targeting of a specific victim's machine.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Undeclared shell command execution Doc Mismatch | scripts/run_prediction.py:28 |
| High | Hardcoded Administrator user paths indicate targeted attack privile_escalation | scripts/health_check.py:14 |
| Medium | Auto-startup service mechanism without user consent Persistence | scripts/health_check.py:36 |
| Medium | Hidden network behavior Doc Mismatch | scripts/health_check.py:21 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | WRITE | ✗ Violation | scripts/health_check.py:46 - subprocess.Popen starts service |
| Network | NONE | READ | ✗ Violation | scripts/health_check.py:21 - urllib GET to localhost:8000 |
| Shell | NONE | WRITE | ✗ Violation | scripts/run_prediction.py:28 - subprocess.run with powershell |
| Environment | NONE | READ | ✗ Violation | scripts/model_switch.py - uses conda environment activation |
File Tree
4 files · 9.7 KB · 335 lines Python 3f · 238L
Markdown 1f · 97L
├─
▾
scripts
│ ├─
health_check.py
Python
│ ├─
model_switch.py
Python
│ └─
run_prediction.py
Python
└─
SKILL.md
Markdown
Security Positives
✓ No evidence of credential harvesting (no access to ~/.ssh, ~/.aws, .env)
✓ No base64 encoding or obfuscation detected
✓ No external IP communications (only localhost)
✓ No C2 infrastructure indicators
✓ No supply chain risks (no external dependencies beyond standard library)