扫描报告
45 /100
cat-viking-memory
Viking 记忆系统技能包 - 五级记忆层级自动管理、重要记忆保护、向量相似度提及检测、飞书群聊会话自动保存
Hardcoded private IP address (192.168.5.110) used for Ollama embedding API calls across multiple scripts sends memory content to an undeclared network endpoint, creating potential data exfiltration risk.
谨慎使用
Document the Ollama network dependency explicitly in SKILL.md. Consider making the Ollama host configurable via environment variables with no default or localhost default. Evaluate whether the private IP 192.168.5.110 is legitimate infrastructure or an unexpected external endpoint.
攻击链 3 步
◎
入口 User installs skill based on documented functionality (memory management)
SKILL.md:1⬡
提权 Skill makes HTTP POST requests to hardcoded private IP (
192.168.5.110:11434) memory-pipeline/memory-embed.sh:9◉
影响 Memory content and session data transmitted to external endpoint via embedding API
simple-viking/lib.sh:142安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Undeclared network communication to private IP 文档欺骗 | memory-pipeline/memory-embed.sh:9 |
| 中危 | Memory content sent to hardcoded private IP endpoint 数据外泄 | simple-viking/lib.sh:142 |
| 低危 | Implicit shell:WRITE capability not declared 权限提升 | simple-viking/write.sh:1 |
| 低危 | Python dependencies not pinned 供应链 | multiple |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | WRITE | ✗ 越权 | simple-viking/write.sh:14 - echo "$content" > "$target_path" |
| 网络访问 | NONE | WRITE | ✗ 越权 | memory-pipeline/memory-embed.sh:9, simple-viking/lib.sh:8 - curl requests to OLL… |
| 命令执行 | NONE | WRITE | ✗ 越权 | All scripts in memory-pipeline/ and simple-viking/ are bash scripts executing co… |
1 项发现
中危 外部 URL 外部 URL
http://192.168.5.110:11434 memory-pipeline/memory-embed.sh:9 目录结构
25 文件 · 111.0 KB · 4217 行 Shell 16f · 2325L
Markdown 7f · 1597L
TypeScript 1f · 239L
JSON 1f · 56L
├─
▾
memory-pipeline
│ ├─
memory-auto-save.sh
Shell
│ ├─
memory-embed.sh
Shell
│ ├─
memory-extract-summary.sh
Shell
│ ├─
memory-session-hook.sh
Shell
│ ├─
memory-tier-cron.sh
Shell
│ ├─
memory-tier-downgrade.sh
Shell
│ ├─
memory-tier-gemini.sh
Shell
│ ├─
memory-tools.sh
Shell
│ ├─
mp_mention_detect.sh
Shell
│ └─
SKILL.md
Markdown
├─
▾
references
│ ├─
README.md
Markdown
│ ├─
session-manager.ts
TypeScript
│ └─
飞书集成说明.md
Markdown
├─
▾
simple-viking
│ ├─
extract-memory.sh
Shell
│ ├─
find.sh
Shell
│ ├─
lib.sh
Shell
│ ├─
read.sh
Shell
│ ├─
README.md
Markdown
│ ├─
SKILL.md
Markdown
│ ├─
sv_autoload.sh
Shell
│ ├─
update-layers.sh
Shell
│ └─
write.sh
Shell
├─
config.json
⚠
JSON
├─
SKILL.md
Markdown
└─
使用教程.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
python3 | * | system | 否 | Standard library only - json, math, os modules used |
ollama | * | external | 否 | No version pinning; connects to http://192.168.5.110:11434 |
安全亮点
✓ No credential harvesting detected - scripts do not iterate through environment variables for sensitive keys
✓ No obfuscation patterns found - no base64 encoding, eval(), or anti-analysis techniques
✓ No reverse shell or C2 infrastructure detected
✓ No persistence mechanisms beyond documented crontab entries
✓ TypeScript session manager uses child_process.exec safely with sanitized inputs
✓ Skill is MIT licensed with clear documentation structure