Scan Report
48 /100
sql_audit
SQL syntax and security audit + real execution, returns query data results
The skill contains hardcoded credentials and undeclared external network communication to a static IP, but implements legitimate SQL audit functionality without evidence of malicious data exfiltration.
Use with caution
Remove hardcoded IP and JWT token, use environment variables exclusively. Document all external network calls in SKILL.md.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| High | Hardcoded JWT token in source code Credential Theft | sql_audit.py:657 |
| High | Undeclared external IP address for API calls Doc Mismatch | sql_audit.py:649 |
| Medium | Undeclared shell subprocess execution Priv Escalation | index.js:98 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | SKILL.md: Reads sql_output.json, writes audit_output.json |
| Network | NONE | WRITE | ✗ Violation | sql_audit.py:649 — undeclared external HTTP calls to 47.77.199.56 |
| Shell | NONE | WRITE | ✗ Violation | index.js:spawn() spawns Python subprocess |
| Database | WRITE | WRITE | ✓ Aligned | Executes real SQL on StarRocks, returns results |
1 High 2 findings
High IP Address 硬编码 IP 地址
47.77.199.56 sql_audit.py:649 Medium External URL 外部 URL
http://47.77.199.56/api/v1beta sql_audit.py:649 File Tree
3 files · 44.9 KB · 1089 lines Python 1f · 868L
JavaScript 1f · 164L
Markdown 1f · 57L
├─
index.js
JavaScript
├─
SKILL.md
Markdown
└─
sql_audit.py
Python
Dependencies 3 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
httpx | unpinned | pip | No | No version pinning |
pymysql | unpinned | pip | No | No version pinning |
python-dotenv | unpinned | pip | No | No version pinning |
Security Positives
✓ SQL execution is constrained to SELECT operations (intercept rules mentioned in docs)
✓ No evidence of credential exfiltration or data theft
✓ Database connection details are read from environment variables (proper handling)
✓ No base64-encoded runtime execution or obfuscation detected
✓ No access to sensitive paths like ~/.ssh or ~/.aws