扫描报告
10 /100
ocas-vesper
Daily briefing generator that aggregates signals from across the system into concise morning and evening briefings
Vesper briefing skill has no malicious behavior; the flagged base64 -d usage is legitimate GitHub API response decoding for version checking, fully documented in SKILL.md.
可以安装
No action required. The skill's self-update mechanism is properly documented and uses standard practices for GitHub API interaction.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 提示 | Self-update mechanism uses base64 decoding 文档欺骗 | SKILL.md:275 |
| 低危 | Cooperative read from other skills' directories 权限提升 | SKILL.md:141 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | SKILL.md lines 141-147: reads from ~/openclaw/data/*/proposals/ and ~/openclaw/d… |
| 文件系统 | WRITE | WRITE | ✓ 一致 | SKILL.md lines 147-153: writes to ~/openclaw/data/ocas-vesper/ and ~/openclaw/jo… |
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md lines 266-284: gh api for GitHub version check, documented in skill.jso… |
| 命令执行 | ADMIN | ADMIN | ✓ 一致 | SKILL.md lines 266-284: uses gh CLI, tar, python3 for self-update; cron registra… |
| 技能调用 | NONE | READ | ✓ 一致 | SKILL.md lines 141-147: reads InsightProposal files from other skills' directori… |
| 环境变量 | NONE | NONE | — | No os.environ access detected |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser automation |
| 数据库 | NONE | NONE | — | No database access |
1 严重 5 项发现
严重 编码执行 Base64 编码执行(代码混淆)
base64 -d SKILL.md:275 中危 外部 URL 外部 URL
https://calendar.google.com/calendar/event?eid= SKILL.md:89 中危 外部 URL 外部 URL
https://maps.google.com/?q= SKILL.md:89 中危 外部 URL 外部 URL
https://mail.google.com/mail/u/0/#inbox/ SKILL.md:89 提示 邮箱 邮箱地址
[email protected] skill.json:6 目录结构
8 文件 · 30.9 KB · 697 行 Markdown 7f · 649L
JSON 1f · 48L
├─
▾
references
│ ├─
briefing_templates.md
Markdown
│ ├─
journal.md
Markdown
│ ├─
schemas.md
Markdown
│ └─
signal_filtering.md
Markdown
├─
CHANGELOG.md
Markdown
├─
README.md
Markdown
├─
skill.json
JSON
└─
SKILL.md
Markdown
安全亮点
✓ All capabilities properly declared in skill.json with clear scope boundaries
✓ Self-update mechanism is fully documented and uses version checking before download
✓ No credential harvesting or environment variable access
✓ No data exfiltration or external communication beyond documented GitHub API
✓ Cooperative inter-skill interface follows read-only pattern (doesn't write to others' directories)
✓ No obfuscated code, reverse shells, or C2 indicators
✓ Scheduled tasks (cron) are clearly documented with proper session isolation
✓ Filesystem access is scoped to expected /workspace/openclaw/data/ocas-vesper/ directory
✓ No sensitive path access (~/.ssh, ~/.aws, .env)
✓ No curl|bash or wget|sh remote script execution patterns