Scan Report
12 /100
desktop-automation-pro
Desktop GUI automation toolkit for browser, mobile devices, and native applications
Legitimate desktop GUI automation toolkit using pyautogui and pywinauto with no malicious behavior, network calls, or credential access detected.
Safe to install
Approve for use. Consider pinning dependency versions in a requirements.txt for supply-chain hygiene.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | Dependencies not pinned Supply Chain | SKILL.md:113 |
| Low | Shell execution not explicitly declared Doc Mismatch | SKILL.md:54 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ | ✓ Aligned | SKILL.md screenshot writes to output file; pyautogui_demo.py:89 screenshot.save(… |
| Shell | NONE | WRITE | ✓ Aligned | SKILL.md mentions 'Python scripts via exec' for native app automation but does n… |
| Network | NONE | NONE | — | Neither script makes any network requests |
| Browser | READ | READ | ✓ Aligned | SKILL.md declares browser tool usage for Chromium automation |
| Clipboard | NONE | NONE | — | No clipboard access in scripts |
File Tree
3 files · 15.8 KB · 546 lines Python 2f · 299L
Markdown 1f · 247L
├─
▾
scripts
│ ├─
pyautogui_demo.py
Python
│ └─
pywinauto_demo.py
Python
└─
SKILL.md
Markdown
Dependencies 3 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
pyautogui | unpinned | pip | No | No version specified in SKILL.md install instructions |
pywinauto | unpinned | pip | No | No version specified in SKILL.md install instructions |
pillow | unpinned | pip | No | No version specified in SKILL.md install instructions |
Security Positives
✓ pyautogui_demo.py enables FAILSAFE protection (pyautogui.FAILSAFE = True), moving mouse to screen corner aborts operations
✓ Scripts are well-documented with docstrings and bilingual comments explaining each function
✓ No network requests, external IP connections, or data exfiltration detected in any script
✓ No credential harvesting, environment variable iteration for secrets, or sensitive file access
✓ No base64 encoding, eval(), or obfuscated code patterns present
✓ No curl|bash or wget|sh remote script execution
✓ Argparse-based CLI with input validation — no arbitrary command injection vectors
✓ No hidden HTML comments, embedded payloads, or steganographic elements