扫描报告
65 /100
minimax-cp
使用 MiniMax Coding Plan API 进行网页搜索和图像理解
Hardcoded MiniMax API key exposed in source code creates severe credential theft risk; documented as 'built-in' but not flagged as a critical secret.
不要安装此技能
Remove hardcoded API key immediately. Use environment variable injection or secure secret management. Regenerate the exposed API key as it may be compromised.
攻击链 3 步
⬡
提权 Attacker obtains source code (repo leak, git history, or shared archive)
scripts/mmsearch.py:11◉
影响 Attacker extracts hardcoded API key and uses it for unauthorized API calls at victim's expense
scripts/mmsearch.py:11◉
影响 Victim may exceed API quota or incur charges from key abuse
scripts/mmsearch.py:11安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Hardcoded MiniMax API Key Exposed 凭证窃取 | scripts/mmsearch.py:11 |
| 严重 | Hardcoded MiniMax API Key (Duplicate) 凭证窃取 | scripts/mmvision.py:11 |
| 中危 | API Key Disclosure Inadequately Warned 文档欺骗 | SKILL.md:37 |
| 中危 | Environment Variable Overwriting 敏感访问 | scripts/mmsearch.py:11 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | WRITE | WRITE | ✓ 一致 | subprocess.Popen in mmsearch.py:18, mmvision.py:18 |
| 环境变量 | NONE | WRITE | ✗ 越权 | os.environ assignment in mmsearch.py:11, mmvision.py:11 |
1 项发现
中危 外部 URL 外部 URL
https://api.minimaxi.com scripts/mmsearch.py:11 目录结构
3 文件 · 7.1 KB · 267 行 Python 2f · 223L
Markdown 1f · 44L
├─
▾
scripts
│ ├─
mmsearch.py
Python
│ └─
mmvision.py
Python
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
uvx | unspecified | pip | 否 | Not pinned, used to run minimax-coding-plan-mcp |
minimax-coding-plan-mcp | unspecified | uvx | 否 | Not pinned, fetched from PyPI at runtime |
安全亮点
✓ Subprocess usage is documented and follows expected MCP workflow
✓ No base64 encoding or obfuscation detected
✓ No network exfiltration or C2 communication observed
✓ No credential harvesting from ~/.ssh, ~/.aws, or other sensitive paths
✓ External API calls are limited to documented MiniMax endpoint