Scan Report
5 /100
zhuocha
招投标重复项目核实助手 - Bidding/tender duplicate verification assistant
Legitimate internal bidding/tender duplicate verification tool with no malicious indicators. All network activity confined to private RFC1918 IP ranges.
Safe to install
Approve for use. Consider pinning requests library version for dependency hygiene.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | Dependency version not pinned | scripts/zhuocha_finder.py |
| Info | SQL injection protection present | scripts/zhuocha_finder.py:108 |
| Info | All network targets are internal RFC1918 addresses | SKILL.md:12 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ | READ | ✓ Aligned | All HTTP requests to 192.168.88.51 private IPs (5100/5200/6100) |
| Filesystem | NONE | READ | ✓ Aligned | ~/.openclaw/workspace/.zhuocha_cursor.json for state persistence |
| Shell | NONE | NONE | — | SKILL.md explicitly prohibits bash curl loops; script uses Python urllib |
3 findings
Medium External URL 外部 URL
http://192.168.88.51:6100/insert SKILL.md:66 Medium External URL 外部 URL
http://192.168.88.51:6100/query scripts/zhuocha_finder.py:21 Medium External URL 外部 URL
http://192.168.88.51:5100/query scripts/zhuocha_finder.py:22 File Tree
2 files · 16.5 KB · 405 lines Python 1f · 225L
Markdown 1f · 180L
├─
▾
scripts
│ └─
zhuocha_finder.py
Python
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
requests | * | pip | No | Version not pinned |
Security Positives
✓ Parameterized SQL queries prevent injection attacks
✓ All network activity to private RFC1918 IPs (192.168.x.x) - no external exfiltration
✓ Explicit bash prohibition documented in SKILL.md (use Python urllib)
✓ State file is non-sensitive workspace metadata
✓ No credential harvesting or environment variable scanning
✓ No base64, eval, or obfuscation patterns
✓ No hidden instructions or suspicious comments
✓ Single-purpose business logic with clear documentation