扫描报告
68 /100
self-evolution-engine
自我进化引擎 - 让AI Skill具备自我分析、自我改进、自我学习的能力
Hardcoded billing API key with no declared credential handling, plus undocumented external data transmission to skillpay.me that is only minimally mentioned in SKILL.md — a significant doc-to-code mismatch.
不要安装此技能
Immediately rotate the hardcoded API key and migrate it to an environment variable (SKILLPAY_API_KEY). Enhance SKILL.md to fully document all data sent to external services, including the user ID and API key transmission. Consider whether the billing integration warrants the credential exposure risk.
攻击链 3 步
◎
入口 Skill deployed with hardcoded billing API key embedded in payment.py
payment.py:12⬡
提权 Attacker extracts the hardcoded API key from source code
payment.py:12◉
影响 Attacker uses extracted key to make unauthorized billing API calls against skillpay.me on behalf of the skill operator
payment.py:38安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Hardcoded Billing API Key in Source Code 凭证窃取 | payment.py:12 |
| 高危 | Undeclared External Data Transmission 数据外泄 | payment.py:76 |
| 高危 | SKILL.md Does Not Match Implementation 文档欺骗 | SKILL.md:1 |
| 中危 | Hardcoded Privileged Workspace Path 敏感访问 | scripts/evolution_generator.py:22 |
| 低危 | Unpinned Dependencies with Lower Bounds Only 供应链 | requirements.txt:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | NONE | READ | ✓ 一致 | payment.py:20-30 makes requests.post() to https://skillpay.me with API key and u… |
| 环境变量 | NONE | READ | ✓ 一致 | payment.py:76 reads os.environ.get('SKILLPAY_USER_ID') |
| 文件系统 | NONE | WRITE | ✓ 一致 | evolution_generator.py:22, version_manager.py:18 hardcode /root/.openclaw/worksp… |
1 高危 2 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY = "sk_f03aa8f8bbcf79f7aa11c112d904780f22e62add1464e3c41a79600a451eb1d2" payment.py:12 中危 外部 URL 外部 URL
https://skillpay.me payment.py:11 目录结构
9 文件 · 56.0 KB · 1662 行 Python 5f · 1300L
Markdown 2f · 329L
JSON 1f · 19L
Text 1f · 14L
├─
▾
references
│ └─
architecture.md
Markdown
├─
▾
scripts
│ ├─
error_analyzer.py
Python
│ ├─
evolution_generator.py
Python
│ ├─
performance_monitor.py
Python
│ └─
version_manager.py
Python
├─
_meta.json
JSON
├─
payment.py
Python
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 6 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
pandas | >=2.0.0 | pip | 否 | Version not pinned, lower-bound only |
numpy | >=1.24.0 | pip | 否 | Version not pinned |
psutil | >=5.9.0 | pip | 否 | Version not pinned |
matplotlib | >=3.7.0 | pip | 否 | Version not pinned |
python-dateutil | >=2.8.0 | pip | 否 | Version not pinned |
requests | not declared | pip | 否 | Used in payment.py but not listed in requirements.txt |
安全亮点
✓ No shell execution, subprocess, or command injection vectors found
✓ No credential harvesting beyond the billing API key (which is used for its intended purpose, not exfiltrated elsewhere)
✓ No base64-encoded payloads, obfuscated code, or anti-analysis techniques
✓ Evolution apply and rollback operations require explicit --confirm flags, providing a human-in-the-loop safeguard
✓ Backup creation before rollback operations prevents accidental data loss
✓ No access to ~/.ssh, ~/.aws, .env, or other sensitive user paths
✓ No reverse shell, C2, or data-theft-only beacons detected