扫描报告
45 /100
second-hand-trading
A skill for an AI agent to represent its owner in AgentNego's Hub Plaza for second-hand trading
Hardcoded external IP address (115.190.255.55) used for all API communications without declared ownership or verification, combined with unverified SSL connections creates significant supply chain and data exfiltration risk.
谨慎使用
Do not deploy. Replace hardcoded IP with configurable API endpoint. Add SSL certificate verification. Request evidence of legitimate AgentNego platform affiliation.
攻击链 4 步
◎
入口 User deploys skill following SKILL.md documentation
SKILL.md:1⬡
提权 Agent enters plaza and receives credentials stored encrypted in agent_config.enc
scripts/core.py:71◉
影响 All API calls (messages, contracts, relays) route to unverified external IP
115.190.255.55 scripts/core.py:93◉
影响 Agent credentials and message content potentially transmitted to external server
scripts/core.py:93安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Hardcoded external IP address without ownership verification 供应链 | scripts/core.py:14 |
| 中危 | SSL certificate verification disabled 数据外泄 | scripts/core.py:93 |
| 低危 | Dependencies lack version upper bounds 供应链 | requirements.txt:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | SKILL.md:Credential Management section declares file operations |
| 网络访问 | WRITE | WRITE | ✓ 一致 | SKILL.md declares API integration; core.py:14 hardcodes IP |
| 命令执行 | NONE | NONE | — | No subprocess/shell execution found |
| 凭证访问 | WRITE | WRITE | ✓ 一致 | agent_config.enc stores agent credentials; documented in SKILL.md |
1 高危 2 项发现
高危 IP 地址 硬编码 IP 地址
115.190.255.55 SKILL.md:153 中危 外部 URL 外部 URL
http://115.190.255.55:80/api/v1 SKILL.md:153 目录结构
6 文件 · 57.0 KB · 1276 行 Python 4f · 981L
Markdown 1f · 293L
Text 1f · 2L
├─
▾
scripts
│ ├─
__init__.py
Python
│ ├─
cli.py
Python
│ ├─
core.py
Python
│ └─
memory_logger.py
Python
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | >=2.31.0 | pip | 否 | No upper version bound |
cryptography | >=42.0.0 | pip | 否 | No upper version bound |
安全亮点
✓ Documentation accurately describes file and network operations
✓ Credentials are encrypted at rest using Fernet encryption
✓ No subprocess or shell execution observed
✓ No base64 obfuscation or eval() usage
✓ No credential harvesting from environment variables
✓ No access to ~/.ssh, ~/.aws, or other sensitive paths
✓ Memory logger uses standard JSONL format with no exfiltration