Scan Report
65 /100
minimax-cp
使用 MiniMax Coding Plan API 进行网页搜索和图像理解
Hardcoded MiniMax API key exposed in source code creates severe credential theft risk; documented as 'built-in' but not flagged as a critical secret.
Do not install this skill
Remove hardcoded API key immediately. Use environment variable injection or secure secret management. Regenerate the exposed API key as it may be compromised.
Attack Chain 3 steps
⬡
Escalation Attacker obtains source code (repo leak, git history, or shared archive)
scripts/mmsearch.py:11◉
Impact Attacker extracts hardcoded API key and uses it for unauthorized API calls at victim's expense
scripts/mmsearch.py:11◉
Impact Victim may exceed API quota or incur charges from key abuse
scripts/mmsearch.py:11Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Hardcoded MiniMax API Key Exposed Credential Theft | scripts/mmsearch.py:11 |
| Critical | Hardcoded MiniMax API Key (Duplicate) Credential Theft | scripts/mmvision.py:11 |
| Medium | API Key Disclosure Inadequately Warned Doc Mismatch | SKILL.md:37 |
| Medium | Environment Variable Overwriting Sensitive Access | scripts/mmsearch.py:11 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | WRITE | WRITE | ✓ Aligned | subprocess.Popen in mmsearch.py:18, mmvision.py:18 |
| Environment | NONE | WRITE | ✗ Violation | os.environ assignment in mmsearch.py:11, mmvision.py:11 |
1 findings
Medium External URL 外部 URL
https://api.minimaxi.com scripts/mmsearch.py:11 File Tree
3 files · 7.1 KB · 267 lines Python 2f · 223L
Markdown 1f · 44L
├─
▾
scripts
│ ├─
mmsearch.py
Python
│ └─
mmvision.py
Python
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
uvx | unspecified | pip | No | Not pinned, used to run minimax-coding-plan-mcp |
minimax-coding-plan-mcp | unspecified | uvx | No | Not pinned, fetched from PyPI at runtime |
Security Positives
✓ Subprocess usage is documented and follows expected MCP workflow
✓ No base64 encoding or obfuscation detected
✓ No network exfiltration or C2 communication observed
✓ No credential harvesting from ~/.ssh, ~/.aws, or other sensitive paths
✓ External API calls are limited to documented MiniMax endpoint