扫描报告
5 /100
baidu-test
Search the web using Baidu AI Search Engine (BDSE)
A legitimate Baidu web search tool that makes HTTP POST requests to Baidu's official API using an environment variable API key. No malicious behavior, obfuscation, or credential exfiltration detected.
可以安装
No blocking action required. Consider pinning the requests library version in a requirements.txt for improved supply chain hygiene.
安全发现 1 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Unpinned Python dependency 供应链 | scripts/search.py:3 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | READ | READ | ✓ 一致 | scripts/search.py:19 - HTTP POST to qianfan.baidubce.com |
| 环境变量 | READ | READ | ✓ 一致 | scripts/search.py:67 - os.getenv('BAIDU_API_KEY') |
| 文件系统 | NONE | NONE | — | No file operations in code |
| 命令执行 | NONE | NONE | — | No subprocess or shell execution found |
1 项发现
中危 外部 URL 外部 URL
https://qianfan.baidubce.com/v2/ai_search/web_search scripts/search.py:10 目录结构
2 文件 · 4.8 KB · 154 行 Python 1f · 102L
Markdown 1f · 52L
├─
▾
scripts
│ └─
search.py
Python
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
requests | * | pip | 否 | Version not pinned |
安全亮点
✓ API key read from environment variable, not hardcoded
✓ No credential exfiltration - key only used for Baidu API authentication
✓ No shell execution (subprocess, os.popen) detected
✓ No obfuscation (base64, eval) or anti-analysis patterns
✓ Clean, readable code that matches documentation
✓ Makes requests to a known, legitimate Baidu API endpoint
✓ No sensitive path access (~/.ssh, ~/.aws, .env files)
✓ No C2 communication or data exfiltration patterns