扫描报告
15 /100
jettyd
Interact with IoT devices via the jettyd platform — read sensors, send commands, manage rules, and list devices
A legitimate IoT device management skill for the jettyd platform. All functionality is declared, the implementation is clean, and there are no security violations. The only flag is a template password placeholder in documentation which is clearly illustrative.
可以安装
Approve for use. The hardcoded password placeholder in blueprint.md is a template example with no security impact — it is not actual credentials.
安全发现 1 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Template password placeholder in documentation 文档欺骗 | blueprint.md:58 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | READ | READ | ✓ 一致 | jettyd-cli.js:42 — fetch to api.jettyd.com only |
| 文件系统 | READ | READ | ✓ 一致 | jettyd-cli.js:22-29 — reads ~/.openclaw/openclaw.json for API key; langchain_too… |
| 命令执行 | WRITE | NONE | ✓ 一致 | SKILL.md declares 'bins: node' for running the CLI; no subprocess/bash execution… |
1 高危 9 项发现
高危 API 密钥 疑似硬编码凭证
PASSWORD="YourNetworkPassword" blueprint.md:58 中危 外部 URL 外部 URL
https://jettyd.com SKILL.md:14 中危 外部 URL 外部 URL
https://api.jettyd.com/v1 SKILL.md:15 中危 外部 URL 外部 URL
https://jettyd.com/docs/mcp SKILL.md:150 中危 外部 URL 外部 URL
https://api.jettyd.com/v1/devices blueprint.md:84 中危 外部 URL 外部 URL
https://api.jettyd.com/v1/devices/DEVICE_ID/config blueprint.md:177 中危 外部 URL 外部 URL
https://api.jettyd.com/v1/webhooks blueprint.md:200 中危 外部 URL 外部 URL
https://hooks.slack.com/... blueprint.md:205 中危 外部 URL 外部 URL
https://docs.jettyd.com blueprint.md:235 目录结构
6 文件 · 25.9 KB · 862 行 Markdown 4f · 461L
JavaScript 1f · 221L
Python 1f · 180L
├─
▾
examples
│ ├─
langchain_tool.py
Python
│ └─
README.md
Markdown
├─
▾
references
│ └─
api-summary.md
Markdown
├─
▾
scripts
│ └─
jettyd-cli.js
JavaScript
├─
blueprint.md
Markdown
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | * | pip | 否 | Only in langchain_tool.py example file, not required for the skill itself |
安全亮点
✓ All network requests go to the single, declared endpoint api.jettyd.com — no data exfiltration
✓ No shell command execution, subprocess, or eval patterns found in the codebase
✓ No credential harvesting beyond the intended API key — environment and config file read are both declared and scoped
✓ No obfuscation techniques (no base64, no dynamic code loading, no anti-analysis patterns)
✓ No supply chain risk — no dependencies with unpinned versions or known vulnerabilities
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env) — only reads ~/.openclaw/openclaw.json as declared
✓ API key is used exclusively for Bearer token auth to the jettyd platform — not exfiltrated elsewhere