扫描报告
38 /100
openclaw-security-patrol
OpenClaw multi-mode security audit tool with optional threat intelligence reporting to auth.ctct.cn
OpenClaw security audit skill performs legitimate security scanning but collects extensive device fingerprinting data (MAC, hostname, persistent agent_id, full skill inventory) and transmits it to auth.ctct.cn under --push mode, with persistent tracking across sessions despite well-documented consent flows.
谨慎使用
Review the data collection scope carefully before consenting to --push mode. The persistent agent_id enables long-term device fingerprinting. Consider using local-only mode for privacy-sensitive environments.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Extensive device fingerprinting under --push mode 数据外泄 | scripts/openclaw-hybrid-audit-changeway.js:1160 |
| 中危 | SKILL.md declares credentials:none but script reads sensitive credential files 文档欺骗 | scripts/openclaw-hybrid-audit-changeway.js:285 |
| 中危 | Unpinned Node.js runtime dependency 供应链 | SKILL.md:1 |
| 低危 | Gateway process environment variable scanning 敏感访问 | scripts/openclaw-hybrid-audit-changeway.js:395 |
| 低危 | FILTER_SKILLS_KEYWORDS silently excludes changeway-related skills from audit 文档欺骗 | scripts/openclaw-hybrid-audit-changeway.js:308 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | SKILL.md: Local file writes to ~/.openclaw/ |
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md: --push mode POSTs to auth.ctct.cn |
| 命令执行 | WRITE | WRITE | ✓ 一致 | SKILL.md: 17 spawnSync calls to whitelist of read-only commands |
| 环境变量 | NONE | READ | ✓ 一致 | Reads /proc/PID/environ for gateway process sensitive variable names |
2 项发现
中危 外部 URL 外部 URL
https://auth.ctct.cn:10020/changeway-open/api/pushAuditData SKILL.md:32 中危 外部 URL 外部 URL
https://auth.ctct.cn:10020/changeway-open/api/skills/assessment SKILL.md:33 目录结构
3 文件 · 86.8 KB · 1973 行 JavaScript 1f · 1447L
Markdown 2f · 526L
├─
▾
references
│ └─
cron-setup.md
Markdown
├─
▾
scripts
│ └─
openclaw-hybrid-audit-changeway.js
JavaScript
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
node | >=18 | runtime | 否 | No upper version bound specified |
安全亮点
✓ All spawnSync calls use hardcoded command whitelists with no user-controlled input — no command injection risk
✓ Shell is explicitly disabled on Unix/Linux platforms (shell: false)
✓ On Windows, shell is only enabled for .cmd wrappers with hardcoded arguments
✓ Consent flow is well-designed: requires explicit '2 已了解' confirmation before --push mode
✓ Cron jobs are explicitly protected: --push is forbidden in cron per documentation
✓ SHA-256 integrity hash is embedded in script header for tamper verification
✓ Full data collection behavior is extensively documented in SKILL.md privacy section
✓ Replay protection via timestamp+nonce mechanism (though not device authentication)
✓ Only brief summaries uploaded, not full detail command outputs
✓ agent_id generation uses crypto.randomUUID() which is cryptographically appropriate