Scan Report
45 /100
cat-viking-memory
Viking 记忆系统技能包 - 五级记忆层级自动管理、重要记忆保护、向量相似度提及检测、飞书群聊会话自动保存
Hardcoded private IP address (192.168.5.110) used for Ollama embedding API calls across multiple scripts sends memory content to an undeclared network endpoint, creating potential data exfiltration risk.
Use with caution
Document the Ollama network dependency explicitly in SKILL.md. Consider making the Ollama host configurable via environment variables with no default or localhost default. Evaluate whether the private IP 192.168.5.110 is legitimate infrastructure or an unexpected external endpoint.
Attack Chain 3 steps
◎
Entry User installs skill based on documented functionality (memory management)
SKILL.md:1⬡
Escalation Skill makes HTTP POST requests to hardcoded private IP (
192.168.5.110:11434) memory-pipeline/memory-embed.sh:9◉
Impact Memory content and session data transmitted to external endpoint via embedding API
simple-viking/lib.sh:142Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Undeclared network communication to private IP Doc Mismatch | memory-pipeline/memory-embed.sh:9 |
| Medium | Memory content sent to hardcoded private IP endpoint Data Exfil | simple-viking/lib.sh:142 |
| Low | Implicit shell:WRITE capability not declared Priv Escalation | simple-viking/write.sh:1 |
| Low | Python dependencies not pinned Supply Chain | multiple |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | WRITE | ✗ Violation | simple-viking/write.sh:14 - echo "$content" > "$target_path" |
| Network | NONE | WRITE | ✗ Violation | memory-pipeline/memory-embed.sh:9, simple-viking/lib.sh:8 - curl requests to OLL… |
| Shell | NONE | WRITE | ✗ Violation | All scripts in memory-pipeline/ and simple-viking/ are bash scripts executing co… |
1 findings
Medium External URL 外部 URL
http://192.168.5.110:11434 memory-pipeline/memory-embed.sh:9 File Tree
25 files · 111.0 KB · 4217 lines Shell 16f · 2325L
Markdown 7f · 1597L
TypeScript 1f · 239L
JSON 1f · 56L
├─
▾
memory-pipeline
│ ├─
memory-auto-save.sh
Shell
│ ├─
memory-embed.sh
Shell
│ ├─
memory-extract-summary.sh
Shell
│ ├─
memory-session-hook.sh
Shell
│ ├─
memory-tier-cron.sh
Shell
│ ├─
memory-tier-downgrade.sh
Shell
│ ├─
memory-tier-gemini.sh
Shell
│ ├─
memory-tools.sh
Shell
│ ├─
mp_mention_detect.sh
Shell
│ └─
SKILL.md
Markdown
├─
▾
references
│ ├─
README.md
Markdown
│ ├─
session-manager.ts
TypeScript
│ └─
飞书集成说明.md
Markdown
├─
▾
simple-viking
│ ├─
extract-memory.sh
Shell
│ ├─
find.sh
Shell
│ ├─
lib.sh
Shell
│ ├─
read.sh
Shell
│ ├─
README.md
Markdown
│ ├─
SKILL.md
Markdown
│ ├─
sv_autoload.sh
Shell
│ ├─
update-layers.sh
Shell
│ └─
write.sh
Shell
├─
config.json
⚠
JSON
├─
SKILL.md
Markdown
└─
使用教程.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
python3 | * | system | No | Standard library only - json, math, os modules used |
ollama | * | external | No | No version pinning; connects to http://192.168.5.110:11434 |
Security Positives
✓ No credential harvesting detected - scripts do not iterate through environment variables for sensitive keys
✓ No obfuscation patterns found - no base64 encoding, eval(), or anti-analysis techniques
✓ No reverse shell or C2 infrastructure detected
✓ No persistence mechanisms beyond documented crontab entries
✓ TypeScript session manager uses child_process.exec safely with sanitized inputs
✓ Skill is MIT licensed with clear documentation structure