扫描报告
20 /100
CommunityOS Telegram Bot Skill
Simple Telegram Bot management with LLM and knowledge base. Local-only, no external dependencies.
A legitimate Telegram bot management tool with minor security concerns: hardcoded auth bypass, undeclared subprocess spawning, and undocumented filesystem write operations, but no evidence of malicious behavior or credential exfiltration.
可以安装
Review and fix the require_auth() function to enforce actual authentication. Document all filesystem and shell operations in SKILL.md. Consider pinning dependency versions.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Hardcoded authentication bypass | admin/app.py:232 |
| 低危 | Undeclared subprocess execution | admin/app.py:1128 |
| 低危 | Undocumented filesystem WRITE operations | admin/app.py:864 |
| 低危 | Unpinned dependencies | requirements.txt:1 |
| 提示 | Example domain URLs in default config | admin/app.py:142 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | WRITE | ✗ 越权 | admin/app.py:132 - save_json() writes JSON files; admin/app.py:864 - file upload… |
| 命令执行 | NONE | WRITE | ✗ 越权 | admin/app.py:1128-1133 - subprocess.Popen spawns telegram_runner.py |
| 网络访问 | READ | READ | ✓ 一致 | httpx/requests calls to api.telegram.org |
| 环境变量 | READ | READ | ✓ 一致 | os.environ.get() for API keys |
| 技能调用 | NONE | NONE | — | N/A |
| 剪贴板 | NONE | NONE | — | N/A |
| 浏览器 | NONE | NONE | — | N/A |
| 数据库 | NONE | WRITE | ✗ 越权 | ChromaDB vector store writes to chroma_db/ directory |
5 项发现
中危 外部 URL 外部 URL
https://api.example.com/news admin/app.py:142 中危 外部 URL 外部 URL
https://feeds.example.com/web3 admin/app.py:164 中危 外部 URL 外部 URL
https://api.telegram.org/bot admin/app.py:463 中危 外部 URL 外部 URL
https://your-domain/api/telegram/webhook/ admin/app.py:1208 中危 外部 URL 外部 URL
https://api.example.com/v1 admin/lite.html:167 目录结构
12 文件 · 106.3 KB · 2632 行 Python 6f · 1822L
HTML 1f · 529L
JSON 2f · 144L
Markdown 2f · 130L
Text 1f · 7L
├─
▾
admin
│ ├─
app.py
Python
│ ├─
lite.html
HTML
│ └─
telegram_runner.py
Python
├─
▾
bot_engine
│ ├─
__init__.py
Python
│ ├─
bot_instance.py
Python
│ ├─
config_parser.py
Python
│ └─
manager.py
Python
├─
▾
config
│ └─
openclaw.json
JSON
├─
_meta.json
JSON
├─
README.md
Markdown
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 5 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
fastapi | 0.109.0 | pip | 否 | Version pinned |
uvicorn | 0.27.0 | pip | 否 | Version pinned |
requests | 2.31.0 | pip | 否 | Version pinned |
chromadb | 0.4.22 | pip | 否 | Version pinned |
pyyaml | 6.0.1 | pip | 否 | Version pinned |
安全亮点
✓ No credential exfiltration - API keys are only used locally for LLM/Telegram API calls
✓ No base64-encoded commands or obfuscated shell execution
✓ No access to sensitive paths like ~/.ssh or ~/.aws
✓ No reverse shell, C2 communications, or data theft behavior
✓ Local-only operation documented (127.0.0.1 binding)
✓ External URLs use example.com domains, not real exfiltration endpoints
✓ File operations are standard web application patterns (upload/download/delete)