扫描报告
65 /100
Enterprise Security
企业级安全套件 - 高危操作确认、自动备份、回滚机制、技能安检
Skill uses undeclared shell execution with hardcoded database credentials to write directly to PostgreSQL memories, representing significant hidden functionality not documented in SKILL.md.
不要安装此技能
This skill performs shell commands (docker exec with psql) and database writes that are not declared in documentation. If needed, it should be rewritten to use declared skill_invoke capabilities or remove the activate.js script entirely.
攻击链 5 步
◎
入口 User installs skill thinking it's a simple security tool
SKILL.md:1⬡
提权 activate.js executes docker commands with execSync
activate.js:29⬡
提权 Hardcoded credentials stored in source code
activate.js:19⬡
提权 Database writes to PostgreSQL memories table
activate.js:28◉
影响 Attacker with code access could modify credentials or SQL injection
activate.js:28安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Undeclared shell execution via execSync 代码执行 | activate.js:29 |
| 高危 | Hardcoded database credentials 凭证窃取 | activate.js:19 |
| 高危 | Documentation mismatch - hidden database/shell behavior 文档欺骗 | SKILL.md:1 |
| 中危 | Implicit database write access 权限提升 | activate.js:28 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✗ 越权 | activate.js:29 execSync() |
| 文件系统 | NONE | WRITE | ✗ 越权 | activate.js:29 docker exec writes to PostgreSQL |
| 数据库 | NONE | WRITE | ✗ 越权 | activate.js:19 direct PostgreSQL access via docker exec |
目录结构
8 文件 · 18.9 KB · 768 行 JavaScript 7f · 528L
Markdown 1f · 240L
├─
▾
modules
│ ├─
backup.js
JavaScript
│ ├─
changelog.js
JavaScript
│ ├─
confirm.js
JavaScript
│ ├─
rollback.js
JavaScript
│ └─
security-check.js
JavaScript
├─
activate.js
JavaScript
├─
index.js
JavaScript
└─
SKILL.md
Markdown
安全亮点
✓ Core modules (backup.js, rollback.js, changelog.js, confirm.js) use only safe fs operations documented in SKILL.md
✓ Security check module performs legitimate skill vetting with no suspicious behavior
✓ No base64 encoding, obfuscation, or anti-analysis patterns detected
✓ No data exfiltration observed in the main codebase
✓ No suspicious network requests to external IPs