扫描报告
22 /100
tiered-recall
分层回忆系统 - 解决上下文长度限制,保持项目延续性
A legitimate memory management skill with one suspicious artifact: a hardcoded Windows System32 path in check_index.py that never executes, combined with absent allowed-tools declarations in SKILL.md.
可以安装
Review check_index.py before production use; add explicit allowed-tools declarations to SKILL.md; remove hardcoded absolute paths.
安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Hardcoded Windows System32 path targeting privileged user directory | scripts/check_index.py:3 |
| 低危 | No allowed-tools section in SKILL.md | SKILL.md:1 |
| 低危 | Unrestricted workspace argument allows arbitrary directory access | scripts/build-index.py, scripts/load.py:174 |
| 提示 | shutil.rmtree used for index cleanup (with user confirmation flag) | scripts/build-index.py:171 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | READ | ✓ 一致 | SKILL.md: no allowed-tools section; build-index.py and load.py read memory/ and … |
| 文件系统 | NONE | WRITE | ✓ 一致 | build-index.py: writes index.json and projects.json to output_dir; load.py: read… |
| 命令执行 | NONE | NONE | — | No subprocess, os.system, or shell invocation found. |
| 网络访问 | NONE | NONE | — | No network requests of any kind in any script. |
3 项发现
中危 外部 URL 外部 URL
https://img.shields.io/badge/ClawHub-tiered--recall-blue README.md:5 中危 外部 URL 外部 URL
https://clawhub.com/skill/tiered-recall README.md:5 中危 外部 URL 外部 URL
https://img.shields.io/badge/version-1.0.0-green README.md:6 目录结构
6 文件 · 36.7 KB · 1251 行 Python 3f · 617L
Markdown 2f · 592L
JSON 1f · 42L
├─
▾
scripts
│ ├─
build-index.py
Python
│ ├─
check_index.py
Python
│ └─
load.py
Python
├─
config.json
⚠
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
安全亮点
✓ No network requests of any kind — fully offline operation
✓ No credential harvesting or environment variable enumeration
✓ No remote script execution (no curl|bash, wget|sh, or eval patterns)
✓ No base64-encoded payloads or obfuscated code
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env
✓ No subprocess or shell invocation — all operations are pure Python pathlib/json
✓ Script code is readable and straightforward, with no hidden functionality
✓ No external dependencies beyond the Python standard library