Scan Report
55 /100
long-term-memory
长期记忆管理系统 - 帮助AI和用户管理、存储、检索长期记忆
Hardcoded API credential in payment.py poses critical credential theft risk; documentation references non-existent tools.
Do not install this skill
Remove hardcoded API key immediately. Use environment variables for credentials. Remove references to non-existent scripts from SKILL.md.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| High | Hardcoded API Key in Source Code Credential Theft | payment.py:12 |
| Medium | Documentation References Non-Existent Scripts Doc Mismatch | SKILL.md:56 |
| Low | Hardcoded Base Directory Path Sensitive Access | scripts/memory_store.py:22 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | WRITE | ✓ Aligned | memory_store.py creates and writes memory files |
| Network | READ | READ | ✓ Aligned | payment.py makes HTTP requests to skillpay.me |
| Shell | NONE | NONE | — | No subprocess or shell execution found |
| Environment | READ | READ | ✓ Aligned | payment.py reads SKILLPAY_USER_ID env var |
| Skill Invoke | NONE | NONE | — | No skill invocation detected |
| Clipboard | NONE | NONE | — | No clipboard access found |
| Browser | NONE | NONE | — | No browser automation found |
| Database | NONE | NONE | — | No database access found |
1 High 2 findings
High API Key 疑似硬编码凭证
API_KEY = "sk_f03aa8f8bbcf79f7aa11c112d904780f22e62add1464e3c41a79600a451eb1d2" payment.py:12 Medium External URL 外部 URL
https://skillpay.me payment.py:11 File Tree
8 files · 44.6 KB · 1397 lines Python 4f · 1066L
Markdown 2f · 301L
JSON 1f · 19L
Text 1f · 11L
├─
▾
references
│ └─
memory-taxonomy.md
Markdown
├─
▾
scripts
│ ├─
memory_compressor.py
Python
│ ├─
memory_search.py
Python
│ └─
memory_store.py
Python
├─
_meta.json
JSON
├─
payment.py
Python
├─
requirements.txt
Text
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
python-dateutil | >=2.8.0 | pip | No | Minimum version specified |
Security Positives
✓ No subprocess or shell execution detected - no arbitrary code execution risk
✓ No credential harvesting from environment variables for exfiltration
✓ No base64-encoded or obfuscated code found
✓ Dependencies have version constraints (python-dateutil>=2.8.0)
✓ No attempts to access ~/.ssh, ~/.aws, or other sensitive credential paths
✓ No reverse shell, C2, or data theft patterns detected
✓ No hidden functionality beyond the declared memory management features