扫描报告
5 /100
Agent Notify
Cross-platform notification sound and taskbar flash for AI coding agents
Agent Notify is a legitimate, well-documented notification utility for AI coding agents. All behavior — shell execution, file writes, agent config modification — is explicitly declared in SKILL.md. No malicious patterns, credential access, data exfiltration, or obfuscation observed.
可以安装
No action required. This skill is safe to use.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Overly broad trigger keywords 文档欺骗 | skill.md:1 |
| 低危 | Missing Windows script file 供应链 | skill.md:88 |
| 提示 | No dependency pinning 供应链 | scripts/notify-linux.sh, scripts/notify-macos.sh:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | skill.md:3 — 'Skill definition' with full install/uninstall instructions for fil… |
| 命令执行 | WRITE | WRITE | ✓ 一致 | skill.md:3 — PowerShell/bash execution explicitly documented for OS detection, s… |
| 网络访问 | NONE | NONE | — | No network operations in any script |
| 环境变量 | NONE | NONE | — | No environment variable access in any script |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser access |
| 数据库 | NONE | NONE | — | No database access |
| 技能调用 | NONE | NONE | — | No cross-skill invocation |
3 项发现
中危 外部 URL 外部 URL
https://img.shields.io/badge/License-GPLv3-blue.svg README.md:7 中危 外部 URL 外部 URL
https://www.gnu.org/licenses/gpl-3.0 README.md:7 中危 外部 URL 外部 URL
https://img.shields.io/badge/Platform-Windows%20%7C%20macOS%20%7C%20Linux-brightgreen.svg README.md:8 目录结构
5 文件 · 21.5 KB · 759 行 Markdown 2f · 588L
Shell 2f · 148L
JSON 1f · 23L
├─
▾
config
│ └─
default.json
JSON
├─
▾
scripts
│ ├─
notify-linux.sh
Shell
│ └─
notify-macos.sh
Shell
├─
README.md
Markdown
└─
skill.md
Markdown
安全亮点
✓ All file operations are explicitly declared in SKILL.md with exact commands and file paths
✓ Agent config modification uses safe merge strategy — never overwrites existing settings
✓ No credential harvesting, API key access, or sensitive path traversal
✓ No base64 encoding, eval, or obfuscated execution patterns
✓ No network requests or data exfiltration endpoints
✓ Scripts use graceful fallbacks for missing tools (e.g., jq→python3, paplay→aplay→pw-play)
✓ Uninstall function properly cleans all created files and settings entries
✓ OS detection via uname is non-destructive and read-only
✓ Config parsing uses standard JSON libraries with no shell injection vectors