扫描报告
38 /100
odds-movement-monitor
盘口变化监控助手 - 实时监控体育博彩盘口变化
Hardcoded billing API key in payment.py, undisclosed payment integration, and misleading SKILL.md file references raise concerns despite no confirmed malicious behavior.
谨慎使用
Remove hardcoded API key from source code and declare payment behavior in SKILL.md. The billing mechanism appears legitimate but lacks transparency.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Hardcoded Billing API Key | payment.py:12 |
| 中危 | Undisclosed Payment Collection | payment.py:1 |
| 中危 | SKILL.md References Non-Existent Files | SKILL.md:107 |
| 低危 | Platform-Specific Path Reference | demo.py:6 |
| 低危 | Environment Variable Credential Access | monitor.py, payment.py:148 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | WRITE | ✓ 一致 | monitor.py:67 - sqlite3.connect() creates local DB |
| 网络访问 | READ | READ+WRITE | ✓ 一致 | payment.py:34 - POSTs to skillpay.me |
| 环境变量 | NONE | READ | ✗ 越权 | payment.py:99 - os.environ.get('SKILLPAY_USER_ID') |
| 命令执行 | NONE | NONE | — | |
| 数据库 | NONE | WRITE | ✓ 一致 | monitor.py:67-113 - SQLite database operations |
2 高危 5 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY="your_api_key_here" README.md:24 高危 API 密钥 疑似硬编码凭证
API_KEY = "sk_f03aa8f8bbcf79f7aa11c112d904780f22e62add1464e3c41a79600a451eb1d2" payment.py:12 中危 外部 URL 外部 URL
https://the-odds-api.com/ README.md:27 中危 外部 URL 外部 URL
https://api.the-odds-api.com/v4 config.json:15 中危 外部 URL 外部 URL
https://skillpay.me payment.py:11 目录结构
10 文件 · 55.1 KB · 1719 行 Python 5f · 1432L
Markdown 2f · 217L
JSON 2f · 68L
Text 1f · 2L
├─
__init__.py
Python
├─
_meta.json
JSON
├─
change_detector.py
Python
├─
config.json
⚠
JSON
├─
demo.py
Python
├─
monitor.py
Python
├─
payment.py
Python
├─
README.md
Markdown
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
aiohttp | >=3.8.0 | pip | 否 | Version not pinned |
requests | >=2.28.0 | pip | 否 | Version not pinned |
安全亮点
✓ No shell command execution or subprocess usage found
✓ No base64-encoded payloads or obfuscated code detected
✓ No credential harvesting targeting sensitive paths (~/.ssh, ~/.aws, etc.)
✓ No data exfiltration mechanisms beyond declared network calls
✓ No reverse shell, C2, or reverse engineering behavior
✓ Database operations are local SQLite for legitimate data storage
✓ Network calls are to declared, legitimate APIs (the-odds-api.com, skillpay.me)