Scan Report
20 /100
claude-bridge
Bridge to local Claude Code CLI - no API key required. Creates task files and shell scripts, then executes Claude Code locally via subprocess.
Legitimate Claude Code CLI bridge with no malicious behavior; minor documentation gaps around subprocess usage.
Safe to install
Add explicit subprocess.run() declaration to SKILL.md and consider using shlex.quote() for prompt escaping to prevent shell injection edge cases.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Low | Shell script injection surface in create_task() | claude_bridge.py:54 |
| Low | subprocess.run() not explicitly declared in SKILL.md | SKILL.md:1 |
| Info | Allowed tools restriction is a good security measure | claude_bridge.py:72 |
| Info | Task execution scoped to local directories | claude_bridge.py:68 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | claude_bridge.py:54-69 writes task JSON and shell scripts to tasks/ directory |
| Shell | WRITE | WRITE | ✓ Aligned | claude_bridge.py:86-90 uses subprocess.run() to execute bash scripts |
| Network | NONE | NONE | — | No direct network calls in claude_bridge.py; Claude Code CLI handles API calls s… |
1 findings
Medium External URL 外部 URL
https://coding.dashscope.aliyuncs.com/apps/anthropic results/analyze_claude_code_source.txt:4 File Tree
51 files · 47.0 KB · 1175 lines Shell 13f · 370L
Text 13f · 287L
Python 1f · 252L
Markdown 1f · 165L
JSON 23f · 101L
├─
▾
results
│ ├─
analyze_claude_code_source.txt
Text
│ ├─
analyze_commands_system.json
JSON
│ ├─
analyze_commands_system.txt
Text
│ ├─
analyze_query_engine.json
JSON
│ ├─
analyze_query_engine.txt
Text
│ ├─
analyze_tools_system.json
JSON
│ ├─
analyze_tools_system.txt
Text
│ ├─
fix_db_cache_002.json
JSON
│ ├─
fix_db_cache_002.txt
Text
│ ├─
fix_db_kairos_001.json
JSON
│ ├─
fix_db_kairos_001.txt
Text
│ ├─
fix_db_memory_003.json
JSON
│ ├─
fix_db_memory_003.txt
Text
│ ├─
fix_web_ui_full_access.txt
Text
│ ├─
fix_web_ui_missing_files.json
JSON
│ ├─
fix_web_ui_missing_files.txt
Text
│ ├─
manual_1775136627.json
JSON
│ ├─
manual_1775136627.txt
Text
│ ├─
manual_1775199172.json
JSON
│ ├─
manual_1775199172.txt
Text
│ ├─
optimize_web_components.txt
Text
│ ├─
test_fix_001.json
JSON
│ └─
test_fix_001.txt
Text
├─
▾
tasks
│ ├─
analyze_claude_code_source.json
JSON
│ ├─
analyze_claude_code_source.sh
Shell
│ ├─
analyze_commands_system.json
JSON
│ ├─
analyze_commands_system.sh
Shell
│ ├─
analyze_query_engine.json
JSON
│ ├─
analyze_query_engine.sh
Shell
│ ├─
analyze_tools_system.json
JSON
│ ├─
analyze_tools_system.sh
Shell
│ ├─
fix_db_cache_002.json
JSON
│ ├─
fix_db_cache_002.sh
Shell
│ ├─
fix_db_kairos_001.json
JSON
│ ├─
fix_db_kairos_001.sh
Shell
│ ├─
fix_db_memory_003.json
JSON
│ ├─
fix_db_memory_003.sh
Shell
│ ├─
fix_web_ui_full_access.json
JSON
│ ├─
fix_web_ui_full_access.sh
Shell
│ ├─
fix_web_ui_missing_files.json
JSON
│ ├─
fix_web_ui_missing_files.sh
Shell
│ ├─
manual_1775136627.json
JSON
│ ├─
manual_1775136627.sh
Shell
│ ├─
manual_1775199172.json
JSON
│ ├─
manual_1775199172.sh
Shell
│ ├─
optimize_web_components.json
JSON
│ ├─
optimize_web_components.sh
Shell
│ ├─
test_fix_001.json
JSON
│ └─
test_fix_001.sh
Shell
├─
claude_bridge.py
Python
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
python3 | system | stdlib | No | No external dependencies; uses only Python standard library (subprocess, json, os, time, pathlib) |
Security Positives
✓ No credential harvesting: no access to ~/.ssh, ~/.aws, .env, or similar sensitive paths
✓ No data exfiltration: no POST requests to external IPs; all results stored locally
✓ No obfuscation techniques: no base64, eval(), or atob() patterns found
✓ Allowed tools restriction (Read,Edit,Bash only) limits Claude Code's capabilities
✓ Task execution is scoped to the skill's own directory
✓ No curl|bash or wget|sh remote script execution patterns
✓ No hidden instructions in HTML comments or other files
✓ Code is readable and straightforward with no suspicious patterns