Scan Report
30 /100
authlock
MFA-bound secret protection with TOTP encryption
AuthLock provides legitimate TOTP-based secret encryption but contains an undocumented subprocess execution feature with shell=True that poses command injection risk.
Use with caution
Review the --exec functionality and consider sanitizing the command argument or removing shell=True. The feature appears designed for legitimate use cases but lacks proper input validation.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| High | Shell command injection vulnerability in --exec | authlock_cli.py:336 |
| Medium | Sensitive path access not prominently documented | SKILL.md:45 |
| Low | TOTP seed stored in plaintext config | authlock_cli.py:103 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ,WRITE | READ,WRITE | ✓ Aligned | SKILL.md:seal/open commands; authlock_cli.py:cmd_seal,cmd_open |
| Shell | NONE | WRITE | ✗ Violation | authlock_cli.py:336 - subprocess.run(cmd, shell=True) |
| Environment | NONE | READ | ✓ Aligned | SKILL.md:OPENCLAW_WORKSPACE,AUTHLOCK_HOME usage |
| Network | NONE | NONE | — | No network requests found |
File Tree
2 files · 29.5 KB · 986 lines Python 1f · 728L
Markdown 1f · 258L
├─
authlock_cli.py
Python
└─
SKILL.md
Markdown
Dependencies 3 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
cryptography | * | pip | No | Standard encryption library |
pyotp | * | pip | No | TOTP generation |
qrcode | * | pip | No | QR code display |
Security Positives
✓ TOTP-based MFA provides strong authentication for decryption
✓ AES-256-GCM with PBKDF2-SHA256 for encryption (industry standard)
✓ No evidence of network exfiltration or data theft
✓ Security notes prohibit echoing plaintext in conversation
✓ PIN optional second factor implemented
✓ Temporary files cleaned up after execution
✓ File permissions set to 0o600 for decrypted secrets