Scan Report
18 /100
contractor-marketing
AI marketing department for contractors and home service businesses. Handles SEO, advertising, social media, email, proposals, review responses, competitor monitoring, and job costing.
A legitimate contractor marketing skill with no malicious code; concerns are limited to a hardcoded read-only API key in documentation and undocumented network access via curl.
Safe to install
Move the Supabase API key to an environment variable instead of hardcoding it in SKILL.md. Add explicit capability declarations (network:READ, shell:WRITE) if shell commands are expected to be executed.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Hardcoded Supabase API Key in SKILL.md Credential Theft | SKILL.md:21 |
| Low | Undeclared Network and Shell Capabilities Doc Mismatch | SKILL.md:20 |
| Low | No Dependency Pinning Supply Chain | SKILL.md:21 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | No file operations found; skill only reads reference Markdown files |
| Network | NONE | READ | ✓ Aligned | SKILL.md:21-27 instructs curl GET to external Supabase REST endpoint |
| Shell | NONE | WRITE | ✓ Aligned | SKILL.md:21-27: curl commands embedded in documentation imply shell execution ca… |
2 findings
Medium External URL 外部 URL
https://dmlybcnpwtnaadmapdhl.supabase.co/rest/v1/strategies?select=title SKILL.md:21 Medium External URL 外部 URL
https://dmlybcnpwtnaadmapdhl.supabase.co/rest/v1/strategies?or=(title.ilike.*QUERY* SKILL.md:27 File Tree
5 files · 8.8 KB · 245 lines Markdown 5f · 245L
├─
▾
references
│ ├─
ad-creative-angles.md
Markdown
│ ├─
onboarding-questions.md
Markdown
│ ├─
proposal-template.md
Markdown
│ └─
review-response-rules.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No executable scripts or binaries — skill is entirely Markdown documentation
✓ No sensitive file access attempts (no ~/.ssh, ~/.aws, .env, or similar paths)
✓ No credential harvesting or exfiltration behavior detected
✓ No obfuscation techniques (no base64, eval, or anti-analysis patterns)
✓ Network access is declared in documentation and has a plausible legitimate purpose (fetching marketing strategy content)
✓ No persistence mechanisms (no cron, startup hooks, or backdoor installation)
✓ Outbound network calls use GET only (read operations), with no POST of user data
✓ All content is in plain text — no hidden instructions in HTML comments or steganography