扫描报告
15 /100
E-Commerce Price Monitor and Competitive Intel
Monitor product prices across Amazon, eBay, Walmart, AliExpress, Zalando and Google Shopping in real time using Apify scrapers
This is a legitimate e-commerce price monitoring skill that uses Apify APIs for web scraping, with no malicious behavior detected. Minor issues include unpinned dependencies and generic marketing language.
可以安装
No immediate action required. Consider pinning npm dependencies to specific versions for reproducible builds.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Unpinned npm dependencies 供应链 | SKILL.md:59 |
| 低危 | Affiliate links in documentation 文档欺骗 | SKILL.md:1 |
| 提示 | No allowed-tools declaration 权限提升 | SKILL.md:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | READ | ✓ 一致 | Code examples use readFileSync/writeFileSync, scoped to skill data |
| 网络访问 | NONE | READ | ✓ 一致 | HTTP calls to Apify API, Anthropic API, and user webhooks are all documented and… |
| 命令执行 | NONE | NONE | — | No shell execution found; only npm install and Node.js code examples |
| 环境变量 | NONE | READ | ✓ 一致 | Uses process.env for APIFY_TOKEN, CLAUDE_API_KEY, WEBHOOK_URL — documented and n… |
| 数据库 | NONE | NONE | — | No database access |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser automation |
| 技能调用 | NONE | NONE | — | No nested skill invocation |
6 项发现
中危 外部 URL 外部 URL
https://www.apify.com?fpr=dx06p SKILL.md:13 中危 外部 URL 外部 URL
https://www.amazon.com/dp/B09G9HD6PD SKILL.md:105 中危 外部 URL 外部 URL
https://www.amazon.com/dp/B08N5WRWNW SKILL.md:106 中危 外部 URL 外部 URL
https://www.amazon.com/dp/B09XS7JWHH SKILL.md:107 中危 外部 URL 外部 URL
https://hooks.slack.com/your-webhook SKILL.md:281 中危 外部 URL 外部 URL
https://console.apify.com/schedules SKILL.md:462 目录结构
1 文件 · 17.3 KB · 520 行 Markdown 1f · 520L
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
apify-client | * | npm | 否 | Version not pinned in SKILL.md |
axios | * | npm | 否 | Version not pinned in SKILL.md |
安全亮点
✓ No malicious code, obfuscation, or base64 payloads found
✓ No credential harvesting or data exfiltration beyond documented API calls
✓ No shell command execution or remote script fetching
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ No reverse shell, C2 communication, or persistence mechanisms
✓ API calls are all to legitimate, documented third-party services (Apify, Anthropic)
✓ Environment variable usage for credentials is standard practice
✓ File I/O is scoped to local price reports with standard paths