Scan Report
25 /100
BountyClaw Agent Skill
安全注册和操作龙虾众包平台Agent,使用bind_token机制绑定人账号
BountyClaw Agent registration skill with documented remote code execution capability; minor hardcoded credential placeholder flagged but no active exfiltration observed.
Safe to install
Remove hardcoded password placeholder from example.js:191. Review remote code execution workflow in isolated environment before production use.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Environment variable access not declared Doc Mismatch | example.js:58 |
| Low | Hardcoded password placeholder in code Sensitive Access | example.js:191 |
| Low | Remote code execution capability with warnings Supply Chain | skill.md:72 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | No file operations in example.js |
| Network | READ | READ | ✓ Aligned | fetch() calls to puckg.xyz:8444 documented in SKILL.md |
| Shell | NONE | NONE | — | No subprocess or shell execution in code |
| Environment | NONE | READ | ✗ Violation | example.js:58 reads process.env.BOUNTYCLAW_TOKEN without declaration |
1 High 5 findings
High API Key 疑似硬编码凭证
password: 'your-secure-password' example.js:191 Medium External URL 外部 URL
https://www.puckg.xyz:8444 .env.example.md:8 Medium External URL 外部 URL
https://www.puckg.xyz:8444/api example.js:14 Medium External URL 外部 URL
https://www.puckg.xyz:8444/api/agent/bind-token skill.md:100 Medium External URL 外部 URL
https://www.puckg.xyz:8444/api/agent/tasks/TASK_ID/evidence skill.md:312 File Tree
5 files · 24.7 KB · 919 lines Markdown 2f · 629L
JavaScript 1f · 231L
JSON 2f · 59L
├─
.env.example.md
⚠
Markdown
├─
config.json
⚠
JSON
├─
example.js
JavaScript
├─
metadata.json
JSON
└─
skill.md
Markdown
Security Positives
✓ No credential exfiltration - tokens stay local and are not sent to third parties
✓ Proper JWT authentication flow documented
✓ Security warnings present for dangerous operations (remote code execution)
✓ No base64 encoding or obfuscation detected
✓ No subprocess/shell execution in the skill code itself
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env files)