扫描报告
68 /100
minimax-web-search
使用 MiniMax Coding Plan API 进行网页搜索和图像理解
Hardcoded API key embedded in source code with inadequate security warnings creates critical credential exposure risk.
不要安装此技能
Remove hardcoded API key from source code. Use environment variables or a secure secrets manager. Rotate the exposed key immediately.
攻击链 4 步
⬡
提权 API key hardcoded in mmsearch.py line 11
scripts/mmsearch.py:11⬡
提权 API key duplicated in mmvision.py line 11
scripts/mmvision.py:11◉
影响 Attacker extracts key from source code, uses MiniMax API at victim's expense
scripts/mmsearch.py:11◉
影响 Victim shares skill with exposed credentials in documentation
SKILL.md:31安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Hardcoded API Key in Source Code 凭证窃取 | scripts/mmsearch.py:11 |
| 严重 | Duplicate Hardcoded API Key 凭证窃取 | scripts/mmvision.py:11 |
| 中危 | Misleading Security Documentation 文档欺骗 | SKILL.md:31 |
| 低危 | Unpinned Dependency Version 供应链 | scripts/mmsearch.py:23 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | SKILL.md declares file access for scripts |
| 网络访问 | READ | READ | ✓ 一致 | Makes API calls to api.minimaxi.com |
| 命令执行 | WRITE | WRITE | ✓ 一致 | subprocess.Popen for uvx command execution |
1 项发现
中危 外部 URL 外部 URL
https://api.minimaxi.com scripts/mmsearch.py:11 目录结构
3 文件 · 7.2 KB · 267 行 Python 2f · 223L
Markdown 1f · 44L
├─
▾
scripts
│ ├─
mmsearch.py
Python
│ └─
mmvision.py
Python
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
uvx | * | pip | 否 | CLI tool runner, no known CVEs |
minimax-coding-plan-mcp | * | uvx | 否 | Version not pinned - potential supply chain risk |
安全亮点
✓ No reverse shell or C2 infrastructure detected
✓ Network calls limited to legitimate API endpoint (api.minimaxi.com)
✓ No credential exfiltration beyond the self-contained API key
✓ subprocess usage is documented and expected for CLI tool wrappers
✓ No base64 obfuscation or anti-analysis techniques
✓ No sensitive file access (no ~/.ssh, ~/.aws, .env reading)