扫描报告
20 /100
VIN Recognition OCR - VIN识别
对车架号/VIN 图片做识别并返回 VIN 及品牌厂家等信息
A straightforward VIN OCR skill that reads local images and POSTs them to a third-party API. No malicious behavior, but undocumented network and filesystem access warrant declaration.
可以安装
Add 'network:WRITE' and 'filesystem:READ' to the skill's declared capabilities in SKILL.md to accurately reflect what the script does.
安全发现 6 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Undeclared outbound network access | vinrecognition.py:47 |
| 低危 | Undeclared local filesystem read access | vinrecognition.py:95 |
| 提示 | Path traversal protection present | vinrecognition.py:17 |
| 提示 | Credential from environment only | vinrecognition.py:120 |
| 提示 | API key validated before use | vinrecognition.py:122 |
| 提示 | No data exfiltration detected | vinrecognition.py:47 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | NONE | WRITE | ✓ 一致 | vinrecognition.py:47 — requests.post(VIN_RECOG_URL, ...) |
| 文件系统 | NONE | READ | ✓ 一致 | vinrecognition.py:95 — open(path, 'rb') |
| 环境变量 | READ | READ | ✓ 一致 | vinrecognition.py:120 — os.getenv('JISU_API_KEY') |
| 命令执行 | NONE | NONE | — |
1 高危 4 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY="your_appkey_here" SKILL.md:26 中危 外部 URL 外部 URL
https://www.jisuapi.com/ SKILL.md:9 中危 外部 URL 外部 URL
https://www.jisuapi.com/api/vinrecognition/ SKILL.md:19 中危 外部 URL 外部 URL
https://api.jisuapi.com/vinrecognition/recognize vinrecognition.py:17 目录结构
2 文件 · 10.4 KB · 304 行 Python 1f · 159L
Markdown 1f · 145L
├─
SKILL.md
Markdown
└─
vinrecognition.py
Python
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | * | pip | 否 | Version not pinned; no known vulnerabilities at time of analysis |
安全亮点
✓ Path traversal protection prevents reading files outside the working directory
✓ API key is read exclusively from environment variable, not hardcoded
✓ Script validates API key presence before making any network calls
✓ No credential harvesting or iteration over environment variables
✓ No subprocess, shell execution, or eval usage
✓ No hidden HTML comments or steganographic payloads
✓ No curl|bash or wget|sh remote script execution
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env
✓ HTTPS is used for the external API call
✓ Timeout of 15 seconds prevents indefinite hanging