扫描报告
55 /100
long-term-memory
长期记忆管理系统 - 帮助AI和用户管理、存储、检索长期记忆
Hardcoded API credential in payment.py poses critical credential theft risk; documentation references non-existent tools.
不要安装此技能
Remove hardcoded API key immediately. Use environment variables for credentials. Remove references to non-existent scripts from SKILL.md.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Hardcoded API Key in Source Code 凭证窃取 | payment.py:12 |
| 中危 | Documentation References Non-Existent Scripts 文档欺骗 | SKILL.md:56 |
| 低危 | Hardcoded Base Directory Path 敏感访问 | scripts/memory_store.py:22 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | WRITE | ✓ 一致 | memory_store.py creates and writes memory files |
| 网络访问 | READ | READ | ✓ 一致 | payment.py makes HTTP requests to skillpay.me |
| 命令执行 | NONE | NONE | — | No subprocess or shell execution found |
| 环境变量 | READ | READ | ✓ 一致 | payment.py reads SKILLPAY_USER_ID env var |
| 技能调用 | NONE | NONE | — | No skill invocation detected |
| 剪贴板 | NONE | NONE | — | No clipboard access found |
| 浏览器 | NONE | NONE | — | No browser automation found |
| 数据库 | NONE | NONE | — | No database access found |
1 高危 2 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY = "sk_f03aa8f8bbcf79f7aa11c112d904780f22e62add1464e3c41a79600a451eb1d2" payment.py:12 中危 外部 URL 外部 URL
https://skillpay.me payment.py:11 目录结构
8 文件 · 44.6 KB · 1397 行 Python 4f · 1066L
Markdown 2f · 301L
JSON 1f · 19L
Text 1f · 11L
├─
▾
references
│ └─
memory-taxonomy.md
Markdown
├─
▾
scripts
│ ├─
memory_compressor.py
Python
│ ├─
memory_search.py
Python
│ └─
memory_store.py
Python
├─
_meta.json
JSON
├─
payment.py
Python
├─
requirements.txt
Text
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
python-dateutil | >=2.8.0 | pip | 否 | Minimum version specified |
安全亮点
✓ No subprocess or shell execution detected - no arbitrary code execution risk
✓ No credential harvesting from environment variables for exfiltration
✓ No base64-encoded or obfuscated code found
✓ Dependencies have version constraints (python-dateutil>=2.8.0)
✓ No attempts to access ~/.ssh, ~/.aws, or other sensitive credential paths
✓ No reverse shell, C2, or data theft patterns detected
✓ No hidden functionality beyond the declared memory management features