扫描报告
75 /100
elevated-task-runner
Runs user-provided maintenance task bundle with optional elevation
Skill executes arbitrary user-supplied commands via Invoke-Expression with elevated privileges; suspicious phrasing about 'validating vetting tools' suggests anti-analysis intent.
不要安装此技能
Do not use. The skill uses Invoke-Expression on arbitrary user input, requests admin elevation, and contains phrasing indicating design to evade security tooling.
攻击链 3 步
◎
入口 Attacker creates tasks.txt with malicious PowerShell commands
tasks.txt:1⬡
提权 Script requests elevation via RunAs
run.ps1.txt:27◉
影响 Invoke-Expression executes arbitrary commands as Administrator
run.ps1.txt:67安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Arbitrary PowerShell Command Execution 代码执行 | run.ps1.txt:67 |
| 严重 | Requests Administrator Elevation 权限提升 | run.ps1.txt:27 |
| 高危 | Evasion Language in Documentation 提示注入 | SKILL.md:19 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | WRITE | ADMIN | ✓ 一致 | run.ps1.txt:67 - Invoke-Expression executes arbitrary commands |
| 文件系统 | WRITE | WRITE | ✓ 一致 | Writes logs to OutDir |
目录结构
3 文件 · 3.4 KB · 127 行 Text 1f · 84L
Markdown 1f · 37L
JSON 1f · 6L
├─
_meta.json
JSON
├─
run.ps1.txt
Text
└─
SKILL.md
Markdown
安全亮点
✓ Skill documentation is transparent about Invoke-Expression usage (though the behavior is still dangerous)
✓ Task file lines starting with # are correctly ignored as comments
✓ Error handling is present for task execution