Low Risk — Risk Score 5/100
Last scan:17 hr ago Rescan
5 /100
baidu-test
Search the web using Baidu AI Search Engine (BDSE)
A legitimate Baidu web search tool that makes HTTP POST requests to Baidu's official API using an environment variable API key. No malicious behavior, obfuscation, or credential exfiltration detected.
Skill Namebaidu-test
Duration33.2s
Enginepi
Safe to install
No blocking action required. Consider pinning the requests library version in a requirements.txt for improved supply chain hygiene.

Findings 1 items

Severity Finding Location
Low
Unpinned Python dependency Supply Chain
The 'requests' library is imported without a version constraint. While not inherently malicious, unpinned dependencies could introduce vulnerabilities if a new compromised version is released.
import requests
→ Add a requirements.txt file with pinned versions: requests>=2.28.0,<3.0.0
scripts/search.py:3
ResourceDeclaredInferredStatusEvidence
Network READ READ ✓ Aligned scripts/search.py:19 - HTTP POST to qianfan.baidubce.com
Environment READ READ ✓ Aligned scripts/search.py:67 - os.getenv('BAIDU_API_KEY')
Filesystem NONE NONE No file operations in code
Shell NONE NONE No subprocess or shell execution found
1 findings
🔗
Medium External URL 外部 URL
https://qianfan.baidubce.com/v2/ai_search/web_search
scripts/search.py:10

File Tree

2 files · 4.8 KB · 154 lines
Python 1f · 102L Markdown 1f · 52L
├─ 📁 scripts
│ └─ 🐍 search.py Python 102L · 3.4 KB
└─ 📝 SKILL.md Markdown 52L · 1.4 KB

Dependencies 1 items

PackageVersionSourceKnown VulnsNotes
requests * pip No Version not pinned

Security Positives

✓ API key read from environment variable, not hardcoded
✓ No credential exfiltration - key only used for Baidu API authentication
✓ No shell execution (subprocess, os.popen) detected
✓ No obfuscation (base64, eval) or anti-analysis patterns
✓ Clean, readable code that matches documentation
✓ Makes requests to a known, legitimate Baidu API endpoint
✓ No sensitive path access (~/.ssh, ~/.aws, .env files)
✓ No C2 communication or data exfiltration patterns