扫描报告
68 /100
skill-security-vet
技能安全審核 - 整合本地掃描 + VirusTotal 雲端威脅情報
Undeclared computer-wide filesystem scanning and auto-quarantine capabilities discovered - SKILL.md only mentions skill scanning but code includes full drive scanning mode.
不要安装此技能
Remove local/full scanning modes or document them clearly with explicit user consent. The computer-wide scanning capability is highly suspicious for a skill auditing tool.
攻击链 4 步
◎
入口 User installs skill-security-vet believing it only scans installed skills
SKILL.md:1⬡
提权 Attacker or compromised tool uses 'local' or 'full' mode to scan entire computer filesystem
vet.ts:219⬡
提权 Tool iterates through directories searching for sensitive files and credential patterns
vet.ts:239◉
影响 Files matching danger patterns are auto-quarantined or removed without user consent
vet.ts:160安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Undeclared local/full computer scanning mode | vet.ts:219 |
| 高危 | Automatic file quarantine without consent | vet.ts:160 |
| 中危 | Undocumented VirusTotal API integration | vet.ts:127 |
| 中危 | Suspicious file pattern matching | vet.ts:50 |
| 低危 | Broad exclusion list suggests awareness of sensitive areas | vet.ts:239 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ+WRITE | ✗ 越权 | vet.ts:219-263 (scanLocalComputer function scans entire drives) |
| 网络访问 | NONE | READ | ✗ 越权 | vet.ts:127-154 (VirusTotal API calls not mentioned in docs) |
| 命令执行 | NONE | NONE | — | No shell execution found |
2 项发现
中危 外部 URL 外部 URL
https://virustotal.com SKILL.md:46 中危 外部 URL 外部 URL
https://www.virustotal.com/api/v3/files/$ vet.ts:127 目录结构
3 文件 · 29.6 KB · 885 行 TypeScript 2f · 768L
Markdown 1f · 117L
├─
SKILL.md
Markdown
├─
startup-scan.ts
TypeScript
└─
vet.ts
TypeScript
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
bun | bundled | system | 否 | Bun runtime required |
安全亮点
✓ Security scanning patterns are well-defined and comprehensive
✓ Uses VirusTotal for external threat intelligence (legitimate security tool feature)
✓ No direct exfiltration of credentials observed - only pattern matching
✓ No reverse shell, C2, or direct malicious code execution
✓ API key stored locally in config directory, not hardcoded