扫描报告
48 /100
sql_audit
SQL syntax and security audit + real execution, returns query data results
The skill contains hardcoded credentials and undeclared external network communication to a static IP, but implements legitimate SQL audit functionality without evidence of malicious data exfiltration.
谨慎使用
Remove hardcoded IP and JWT token, use environment variables exclusively. Document all external network calls in SKILL.md.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Hardcoded JWT token in source code 凭证窃取 | sql_audit.py:657 |
| 高危 | Undeclared external IP address for API calls 文档欺骗 | sql_audit.py:649 |
| 中危 | Undeclared shell subprocess execution 权限提升 | index.js:98 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | SKILL.md: Reads sql_output.json, writes audit_output.json |
| 网络访问 | NONE | WRITE | ✗ 越权 | sql_audit.py:649 — undeclared external HTTP calls to 47.77.199.56 |
| 命令执行 | NONE | WRITE | ✗ 越权 | index.js:spawn() spawns Python subprocess |
| 数据库 | WRITE | WRITE | ✓ 一致 | Executes real SQL on StarRocks, returns results |
1 高危 2 项发现
高危 IP 地址 硬编码 IP 地址
47.77.199.56 sql_audit.py:649 中危 外部 URL 外部 URL
http://47.77.199.56/api/v1beta sql_audit.py:649 目录结构
3 文件 · 44.9 KB · 1089 行 Python 1f · 868L
JavaScript 1f · 164L
Markdown 1f · 57L
├─
index.js
JavaScript
├─
SKILL.md
Markdown
└─
sql_audit.py
Python
依赖分析 3 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
httpx | unpinned | pip | 否 | No version pinning |
pymysql | unpinned | pip | 否 | No version pinning |
python-dotenv | unpinned | pip | 否 | No version pinning |
安全亮点
✓ SQL execution is constrained to SELECT operations (intercept rules mentioned in docs)
✓ No evidence of credential exfiltration or data theft
✓ Database connection details are read from environment variables (proper handling)
✓ No base64-encoded runtime execution or obfuscation detected
✓ No access to sensitive paths like ~/.ssh or ~/.aws