高风险 — 风险评分 65/100
上次扫描:22 小时前 重新扫描
65 /100
minimax-cp
使用 MiniMax Coding Plan API 进行网页搜索和图像理解
Hardcoded MiniMax API key exposed in source code creates severe credential theft risk; documented as 'built-in' but not flagged as a critical secret.
技能名称minimax-cp
分析耗时137.1s
引擎pi
不要安装此技能
Remove hardcoded API key immediately. Use environment variable injection or secure secret management. Regenerate the exposed API key as it may be compromised.

攻击链 3 步

提权 Attacker obtains source code (repo leak, git history, or shared archive)
scripts/mmsearch.py:11
影响 Attacker extracts hardcoded API key and uses it for unauthorized API calls at victim's expense
scripts/mmsearch.py:11
影响 Victim may exceed API quota or incur charges from key abuse
scripts/mmsearch.py:11

安全发现 4 项

严重性 安全发现 位置
严重
Hardcoded MiniMax API Key Exposed 凭证窃取
A real MiniMax API key (sk-cp-...) is hardcoded in plaintext in both mmsearch.py and mmvision.py. If this repo is leaked, shared, or committed to version control, the credential is compromised.
os.environ["MINIMAX_API_KEY"] = "sk-cp-_opubDWoTJY5qpJAoI_AFpXQ_RC4rMuuHzCFeNKLQHwXzykGUAyD-k7wKHiwiGNJB8Op-s_AZqXCeXtSgjBEQMjNHOvGlKutYUx6brckZBFhrqbzj4xWvK4"
→ Remove the hardcoded key. Use os.environ.get('MINIMAX_API_KEY') to read from environment. Document required env var clearly.
scripts/mmsearch.py:11
严重
Hardcoded MiniMax API Key (Duplicate) 凭证窃取
Same hardcoded API key appears in mmvision.py
os.environ["MINIMAX_API_KEY"] = "sk-cp-_opubDWoTJY5qpJAoI_AFpXQ_RC4rMuuHzCFeNKLQHwXzykGUAyD-k7wKHiwiGNJB8Op-s_AZqXCeXtSgjBEQMjNHOvGlKutYUx6brckZBFhrqbzj4xWvK4"
→ Same as above - remove and use environment variable.
scripts/mmvision.py:11
中危
API Key Disclosure Inadequately Warned 文档欺骗
SKILL.md says 'MINIMAX_API_KEY 环境变量(已内置在脚本中)' which translates to 'built into script'. This downplays the severity - the key is a real credential, not a placeholder or safe default.
MINIMAX_API_KEY 环境变量(已内置在脚本中)
→ Clearly document that users should provide their own API key and that no credential is pre-configured.
SKILL.md:37
中危
Environment Variable Overwriting 敏感访问
Scripts overwrite any existing MINIMAX_API_KEY in the environment with a hardcoded value, potentially shadowing user-provided credentials.
os.environ["MINIMAX_API_KEY"] = "sk-cp-..."
→ Use os.environ.setdefault() or only set if not already present.
scripts/mmsearch.py:11
资源类型声明权限推断权限状态证据
命令执行 WRITE WRITE ✓ 一致 subprocess.Popen in mmsearch.py:18, mmvision.py:18
环境变量 NONE WRITE ✗ 越权 os.environ assignment in mmsearch.py:11, mmvision.py:11
1 项发现
🔗
中危 外部 URL 外部 URL
https://api.minimaxi.com
scripts/mmsearch.py:11

目录结构

3 文件 · 7.1 KB · 267 行
Python 2f · 223L Markdown 1f · 44L
├─ 📁 scripts
│ ├─ 🐍 mmsearch.py Python 108L · 2.8 KB
│ └─ 🐍 mmvision.py Python 115L · 3.1 KB
└─ 📝 SKILL.md Markdown 44L · 1.3 KB

依赖分析 2 项

包名版本来源已知漏洞备注
uvx unspecified pip Not pinned, used to run minimax-coding-plan-mcp
minimax-coding-plan-mcp unspecified uvx Not pinned, fetched from PyPI at runtime

安全亮点

✓ Subprocess usage is documented and follows expected MCP workflow
✓ No base64 encoding or obfuscation detected
✓ No network exfiltration or C2 communication observed
✓ No credential harvesting from ~/.ssh, ~/.aws, or other sensitive paths
✓ External API calls are limited to documented MiniMax endpoint