Scan Report
22 /100
ITSM 工单自动提交技能
自动提交 ITSM 工单到企业 IT 服务管理系统(头程询价、尾程询价、批次查询、问题反馈)
Legitimate ITSM ticket automation tool with minor security concerns: hardcoded default credentials and Windows path exposure, but no evidence of credential theft or malicious exfiltration.
Safe to install
Replace hardcoded credentials with environment variable usage only. Remove hardcoded Windows Administrator path. Pin dependency versions in requirements.txt. Consider documenting the shell:WRITE capability explicitly in SKILL.md.
Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Hardcoded default credentials in source code Credential Theft | submit-itsm.py:35 |
| Low | Hardcoded Windows path exposing internal username Sensitive Access | submit-itsm.py:40 |
| Medium | Shell execution not declared in SKILL.md Priv Escalation | start.sh:21 |
| Low | Unpinned Python dependency versions Supply Chain | requirements.txt:1 |
| Low | Remote get-pip.py download as fallback Supply Chain | start.sh:89 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | Screenshots + attachment upload; declared in SKILL.md |
| Network | READ | READ | ✓ Aligned | Accesses itsm.westmonth.com; declared in SKILL.md |
| Shell | NONE | WRITE | ✗ Violation | start.sh:21-30 apt-get update/install, start.sh:53-89 pip install with fallback … |
| Environment | READ | READ | ✓ Aligned | Accepts ITSM_USERNAME, ITSM_PASSWORD, etc. from env vars |
| Browser | WRITE | WRITE | ✓ Aligned | Uses Selenium+CDP to control chromium-browser; declared |
2 findings
Medium External URL 外部 URL
https://itsm.westmonth.com/#/create start.sh:13 Medium External URL 外部 URL
https://bootstrap.pypa.io/get-pip.py start.sh:89 File Tree
6 files · 31.3 KB · 865 lines Python 1f · 493L
Shell 2f · 209L
Markdown 1f · 148L
JSON 1f · 13L
Text 1f · 2L
├─
close.sh
Shell
├─
package.json
JSON
├─
requirements.txt
Text
├─
SKILL.md
Markdown
├─
start.sh
Shell
└─
submit-itsm.py
Python
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
selenium | >=4.0.0 | pip | No | Version not pinned; only lower bound specified |
requests | >=2.28.0 | pip | No | Version not pinned; only lower bound specified |
Security Positives
✓ No credential exfiltration: hardcoded credentials are only used for ITSM login form submission, not sent to third parties
✓ No obfuscation detected: all code is plain text, no base64/eval/atob patterns
✓ No unauthorized sensitive path access: no access to ~/.ssh, ~/.aws, or .env files
✓ No C2 communication or data theft indicators
✓ Screenshots are saved locally only, not exfiltrated
✓ Uses legitimate, documented ITSM portal (itsm.westmonth.com)
✓ Dependency requests is a standard HTTP library, not a data exfiltration tool
✓ Selenium+CDP is a standard browser automation approach