扫描报告
15 /100
lmail_ops_complete
Operate LMail end-to-end with strict registration, authentication, inbox loops, threaded replies, and admin registration audits
This is a legitimate LMail email operations skill with proper credential handling, standard library-only dependencies, and no malicious behavior. Minor concerns include undocumented credential file writes and a hardcoded example URL.
可以安装
This skill is safe to use. Ensure the LMAIL_BASE_URL is trusted before deployment. Consider pinning the base URL in production deployments.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Undeclared credential file writes 文档欺骗 | scripts/strict_register.py:158 |
| 提示 | External service URL reference 敏感访问 | SKILL.md:56 |
| 提示 | No dependency pinning 供应链 | N/A |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | WRITE | ✓ 一致 | Writes credentials.json and state files - necessary for the feature |
| 网络访问 | READ | READ | ✓ 一致 | All network calls to configured LMAIL_BASE_URL |
| 命令执行 | NONE | WRITE | ✓ 一致 | Shell scripts for deployment - documented in SKILL.md |
3 项发现
中危 外部 URL 外部 URL
https://amiigzz.online SKILL.md:56 提示 邮箱 邮箱地址
[email protected] SKILL.md:115 提示 邮箱 邮箱地址
[email protected] assets/payload-templates/send-message.json:2 目录结构
31 文件 · 70.8 KB · 2387 行 Python 11f · 1467L
Shell 8f · 511L
Markdown 8f · 382L
JSON 3f · 23L
YAML 1f · 4L
├─
▾
agents
│ └─
openai.yaml
YAML
├─
▾
assets
│ ├─
▾
curl-snippets
│ │ └─
challenge-solve-register.sh
Shell
│ └─
▾
payload-templates
│ ├─
override-permit.json
JSON
│ ├─
register.json
JSON
│ └─
send-message.json
JSON
├─
▾
references
│ ├─
api-contract.md
Markdown
│ ├─
docs-source-of-truth.md
Markdown
│ ├─
error-codes-runbook.md
Markdown
│ ├─
openclaw-publish-checklist.md
Markdown
│ ├─
ops-playbook.md
Markdown
│ ├─
security-policy.md
Markdown
│ └─
strict-registration-v2.md
Markdown
├─
▾
scripts
│ ├─
admin_fetch_registration_events.py
Python
│ ├─
admin_issue_override_permit.py
Python
│ ├─
chat_fast.py
Python
│ ├─
inbox_loop.py
Python
│ ├─
inbox_once.py
Python
│ ├─
install_for_openclaw.sh
Shell
│ ├─
lmail_http.py
Python
│ ├─
login_verify.py
Python
│ ├─
preflight_check.sh
Shell
│ ├─
print_claude_setup.sh
Shell
│ ├─
publish_clawhub.sh
Shell
│ ├─
send_message.py
Python
│ ├─
send_reply.py
Python
│ ├─
smoke_test_registration_flow.sh
Shell
│ ├─
solve_pow.py
Python
│ ├─
strict_register.py
Python
│ ├─
sync_docs_check.sh
Shell
│ └─
validate_openclaw_skill.sh
Shell
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
python3-standard-library | N/A | built-in | 否 | No external dependencies - uses only stdlib |
安全亮点
✓ Standard library only - no malicious dependencies possible
✓ Credentials are masked when printed (mask_secret function)
✓ Credentials files set to mode 0600
✓ No subprocess/eval/exec usage
✓ No base64 execution into shell - base64 only used for legitimate JWT parsing
✓ No access to ~/.ssh, ~/.aws, .env, or other sensitive paths
✓ No curl|bash or wget|sh remote script execution
✓ All network requests go to configured base URL, no hardcoded IPs
✓ Well-structured code with proper error handling
✓ Security policy document present in references/