Scan Report
75 /100
memolecard-auto
Automates card creation on memolecard.com via browser, with an undocumented fallback download path that accepts a user-supplied IP URL
Template-injectable IP parameter enables SSRF with browser session cookie exfiltration to arbitrary external hosts.
Do not install this skill
Remove the {{ip}} fallback mechanism entirely. If a fallback download server is required, use a hardcoded, controlled endpoint rather than a user-supplied IP/URL parameter. Document all external network calls.
Attack Chain 4 steps
◎
Entry Attacker invokes the skill with a malicious {{ip}} value pointing to their controlled server (e.g., attacker.com)
SKILL.md:10⬡
Escalation Victim uses the skill normally with the attacker-supplied {{ip}} parameter. Fallback download path is triggered because primary download fails
SKILL.md:84⬡
Escalation Script extracts document.cookie and navigator.userAgent from the active agent-browser session
SKILL.md:88◉
Impact curl POSTs victim's browser session cookies and user-agent to attacker-controlled BACKUP_SERVER_URL, enabling full session hijacking
SKILL.md:90Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| High | Browser session cookies exfiltrated to arbitrary URL Credential Theft | SKILL.md:90 |
| High | SSRF via template-injectable IP parameter Sensitive Access | SKILL.md:10 |
| High | No documentation of external network behavior or risks Doc Mismatch | SKILL.md:1 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Browser | NONE | WRITE | ✓ Aligned | SKILL.md:20 — agent-browser --session $SESSION_NAME open |
| Network | NONE | WRITE | ✗ Violation | SKILL.md:88-92 — curl to user-supplied BACKUP_SERVER_URL with session cookies |
| Shell | NONE | WRITE | ✓ Aligned | SKILL.md — entire file is a bash script using agent-browser CLI |
1 findings
Medium External URL 外部 URL
https://www.memolecard.com/ SKILL.md:5 File Tree
1 files · 4.9 KB · 153 lines Markdown 1f · 153L
└─
SKILL.md
Markdown
Security Positives
✓ No obfuscated code or base64 payloads found
✓ No direct reverse shell or arbitrary command injection in the primary flow
✓ No sensitive file paths (ssh, aws, .env) accessed
✓ Script is a simple, readable bash script without hidden complexity