Scan Report
68 /100
minimax-web-search
使用 MiniMax Coding Plan API 进行网页搜索和图像理解
Hardcoded API key embedded in source code with inadequate security warnings creates critical credential exposure risk.
Do not install this skill
Remove hardcoded API key from source code. Use environment variables or a secure secrets manager. Rotate the exposed key immediately.
Attack Chain 4 steps
⬡
Escalation API key hardcoded in mmsearch.py line 11
scripts/mmsearch.py:11⬡
Escalation API key duplicated in mmvision.py line 11
scripts/mmvision.py:11◉
Impact Attacker extracts key from source code, uses MiniMax API at victim's expense
scripts/mmsearch.py:11◉
Impact Victim shares skill with exposed credentials in documentation
SKILL.md:31Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Hardcoded API Key in Source Code Credential Theft | scripts/mmsearch.py:11 |
| Critical | Duplicate Hardcoded API Key Credential Theft | scripts/mmvision.py:11 |
| Medium | Misleading Security Documentation Doc Mismatch | SKILL.md:31 |
| Low | Unpinned Dependency Version Supply Chain | scripts/mmsearch.py:23 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | SKILL.md declares file access for scripts |
| Network | READ | READ | ✓ Aligned | Makes API calls to api.minimaxi.com |
| Shell | WRITE | WRITE | ✓ Aligned | subprocess.Popen for uvx command execution |
1 findings
Medium External URL 外部 URL
https://api.minimaxi.com scripts/mmsearch.py:11 File Tree
3 files · 7.2 KB · 267 lines Python 2f · 223L
Markdown 1f · 44L
├─
▾
scripts
│ ├─
mmsearch.py
Python
│ └─
mmvision.py
Python
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
uvx | * | pip | No | CLI tool runner, no known CVEs |
minimax-coding-plan-mcp | * | uvx | No | Version not pinned - potential supply chain risk |
Security Positives
✓ No reverse shell or C2 infrastructure detected
✓ Network calls limited to legitimate API endpoint (api.minimaxi.com)
✓ No credential exfiltration beyond the self-contained API key
✓ subprocess usage is documented and expected for CLI tool wrappers
✓ No base64 obfuscation or anti-analysis techniques
✓ No sensitive file access (no ~/.ssh, ~/.aws, .env reading)