Scan Report
85 /100
luci-memory
Search personal video memory — media content and portrait data
通过硬编码IP地址 34.45.179.165 窃取用户 API 密钥并外传个人媒体数据,具备凭证收割和数据外泄双重攻击链。
Do not install this skill
立即禁用该技能,撤销泄露的 API 密钥 MEMORIES_AI_KEY,禁止在生产环境中部署。
Attack Chain 3 steps
◎
Entry 用户安装 luci-memory skill,误以为这是 memories.ai 官方工具
SKILL.md:1⬡
Escalation Python模块加载时自动执行 resolve_user_id(),将API密钥POST到 http://
34.45.179.165 完成凭证收割 scripts/run.py:42◉
Impact 所有用户搜索请求(视频/图像/音频/肖像数据)持续POST到
34.45.179.165,完成数据外泄 scripts/run.py:18Findings 6 items
| Severity | Finding | Location |
|---|---|---|
| Critical | API密钥在初始化时即被外传至硬编码外部IP Credential Theft | scripts/run.py:42 |
| Critical | 所有用户个人媒体和肖像数据POST到硬编码外部IP Data Exfil | scripts/run.py:18 |
| Critical | 使用裸IP绕过域名安全检测 Obfuscation | scripts/run.py:18 |
| High | SKILL.md 声称'直接使用Luci-memory API',实际发往第三方IP Doc Mismatch | SKILL.md:1 |
| High | .env 文件包含真实API密钥 Credential Theft | .env:1 |
| Medium | 无第三方依赖但使用标准库,依赖安全性可接受 Supply Chain | scripts/run.py:19 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ | ✓ Aligned | scripts/run.py:26 仅读取 .env 文件获取凭证 |
| Network | NONE | WRITE | ✗ Violation | scripts/run.py:18,42 将API密钥和用户数据POST到硬编码IP 34.45.179.165,SKILL.md未声明任何网络出站行为 |
| Environment | READ | READ | ✓ Aligned | scripts/run.py:35 读取 MEMORIES_AI_KEY(已在SKILL.md声明) |
1 Critical 1 High 4 findings
Critical API Key 硬编码 API 密钥
sk-fdd6e0eca09edd61ff577a675738e687 .env:1 High IP Address 硬编码 IP 地址
34.45.179.165 scripts/run.py:18 Medium External URL 外部 URL
http://34.45.179.165/luci-memory scripts/run.py:18 Medium External URL 外部 URL
https://mavi-backend.memories.ai/serve/api/userinfo scripts/run.py:21 File Tree
5 files · 26.4 KB · 605 lines Python 1f · 432L
Markdown 1f · 165L
YAML 1f · 4L
Shell 1f · 3L
Other 1f · 1L
├─
▾
scripts
│ └─
run.py
Python
├─
.env
⚠
├─
config.yaml
YAML
├─
run.sh
Shell
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
requests (implied via urllib) | stdlib only | Python 3 standard library | No | 仅使用 urllib.request,无第三方依赖 |
Security Positives
✓ 代码结构清晰,无复杂混淆逻辑,便于静态分析识别硬编码IP
✓ 无 eval()、subprocess 等动态代码执行
✓ 无访问 ~/.ssh、~/.aws、.env 以外的敏感路径