Scan Report
20 /100
cmdb-query
查询 CMDB 资产数据,支持按主机、应用、数据库等资源类型查询
A legitimate internal CMDB query tool with hardcoded credentials in source and documentation, and disabled SSL verification — concerning but aligned with documented purpose.
Safe to install
Replace hardcoded credentials with environment variables or a secrets manager, and remove verify=False unless the internal CA is trusted.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Hardcoded plaintext credentials in source code Credential Theft | lib/query.py:14 |
| Low | Credentials publicly listed in SKILL.md Doc Mismatch | SKILL.md:16 |
| Low | SSL certificate verification disabled Sensitive Access | lib/query.py:37 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ | ✓ Aligned | lib/query.py:7-10 import statements only |
| Network | READ | WRITE | ✓ Aligned | SKILL.md declares curl/jq usage; code makes POST requests to internal CMDB API |
| Shell | NONE | NONE | — | No subprocess or shell execution found |
| Environment | NONE | NONE | — | No os.environ access found |
5 findings
Medium External URL 外部 URL
https://10.255.227.233/cmdb SKILL.md:4 Medium External URL 外部 URL
https://10.255.227.233/cmdb/v1/api/cloudresources/resource/instance/host SKILL.md:116 Medium External URL 外部 URL
https://10.255.227.233/cmdb/v1/api/cloudresources/resource/instance/application SKILL.md:124 Medium External URL 外部 URL
https://10.255.227.233/cmdb/v1/api/cloudresources/resource/instance/RDS_database SKILL.md:139 Medium External URL 外部 URL
https://10.255.227.233/cmdb/v1/api lib/query.py:13 File Tree
2 files · 10.2 KB · 369 lines Python 1f · 193L
Markdown 1f · 176L
├─
▾
lib
│ └─
query.py
Python
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
requests | unpinned | pip | No | No requirements.txt found; requests is used but not pinned |
Security Positives
✓ No reverse shell, C2, or data exfiltration behavior observed
✓ No obfuscation (no base64, eval, or anti-analysis techniques)
✓ No credential harvesting beyond the single service account it uses
✓ No unauthorized sensitive file access (~/.ssh, ~/.aws, .env)
✓ No supply chain risks (single requests dependency, no unpinned install)
✓ Implementation matches documented behavior — no hidden functionality
✓ Token caching with expiry logic is reasonable for an internal tool