扫描报告
65 /100
dianping-api
Dianping (大众点评) API skill for searching restaurants and businesses
Remote script execution via curl|bash with base64-encoded content is a critical supply chain vulnerability, compounded by undocumented shell/filesystem/network access in the installation mechanism.
不要安装此技能
Remove the remote install.sh entirely. Distribute the skill as direct file copies rather than base64-encoded blobs fetched at runtime. Declare all file system and network access in SKILL.md.
攻击链 4 步
⬡
提权 Attacker compromises the <URL> host or DNS
install.sh:3⬡
提权 Malicious install.sh replaces legitimate content
install.sh:3⬡
提权 curl|bash executes arbitrary attacker code with user privileges
install.sh:3⬡
提权 Malicious Python/Shell scripts written to disk and chmod +x'd
install.sh:28安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Remote Script Execution via curl|bash 供应链 | install.sh:3 |
| 严重 | Base64-Encoded Source Code Execution 代码混淆 | install.sh:11 |
| 中危 | Undeclared Shell Execution via subprocess 文档欺骗 | dianping_api.py:35 |
| 中危 | Undeclared Filesystem Write Access 文档欺骗 | dianping_login.py:69 |
| 中危 | Undeclared Network Access 文档欺骗 | SKILL.md:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | WRITE | ✗ 越权 | install.sh:24 writes ~/.dianping/cookies.json via Python scripts |
| 网络访问 | NONE | READ | ✗ 越权 | dianping_api.py:35 subprocess.run(['curl',...]) |
| 命令执行 | NONE | WRITE | ✗ 越权 | install.sh:3 curl|bash pattern |
| 环境变量 | NONE | NONE | — | No environment variable access found |
| 技能调用 | NONE | NONE | — | No cross-skill invocation |
2 严重 8 项发现
严重 危险命令 危险 Shell 命令
curl -fsSL <URL>/install.sh | bash install.sh:3 严重 编码执行 Base64 编码执行(代码混淆)
base64 -d install.sh:11 中危 外部 URL 外部 URL
https://www.dianping.com/ scripts/dianping_api.py:38 中危 外部 URL 外部 URL
https://www.dianping.com/search/keyword/%d/0_%s scripts/dianping_api.py:65 中危 外部 URL 外部 URL
https://www.dianping.com/shop/ scripts/dianping_api.py:104 中危 外部 URL 外部 URL
https://www.dianping.com scripts/dianping_login.py:23 中危 外部 URL 外部 URL
https://account.dianping.com/pclogin scripts/dianping_login.py:183 中危 外部 URL 外部 URL
https://www.dianping.com/search/keyword/ scripts/dianping_login.py:218 目录结构
4 文件 · 50.0 KB · 664 行 Python 2f · 462L
Markdown 1f · 165L
Shell 1f · 37L
├─
▾
scripts
│ ├─
dianping_api.py
Python
│ └─
dianping_login.py
Python
├─
install.sh
Shell
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
curl | system-provided | system | 否 | No pip/npm dependencies - uses system curl |
安全亮点
✓ No evidence of credential harvesting beyond the legitimate Dianping session cookies
✓ No reverse shell, C2 communication, or data exfiltration to third-party servers
✓ Cookies stored locally in user's home directory, not transmitted elsewhere
✓ The Python implementation appears functionally legitimate for the stated restaurant search purpose
✓ Uses standard curl User-Agent to appear as a normal browser