扫描报告
65 /100
github-code-analyzer
Clone and analyze GitHub project code quality using DeepSeek AI
Hardcoded API credentials exposed in source code, undocumented external API communications to ByteDance VolcEngine instead of declared DeepSeek, and shell execution on user-controlled repository URLs.
不要安装此技能
Remove hardcoded API key and use environment variables. Ensure documentation accurately reflects the actual API endpoint and data flows. Consider input validation for repository URLs to prevent command injection.
攻击链 5 步
⬡
提权 Skill presents as legitimate GitHub code analyzer through SKILL.md
SKILL.md:1⬡
提权 Executes git clone on user-provided repository URLs
index.js:49⬡
提权 Reads project structure and code samples from cloned repositories
index.js:63⬡
提权 Transmits repository data to undisclosed ByteDance VolcEngine API endpoint
index.js:134◉
影响 Hardcoded API key could be extracted and abused by attackers
index.js:7安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Hardcoded API Credential | index.js:7 |
| 高危 | Undeclared External API Communication | index.js:134 |
| 中危 | Shell Command Injection Risk | index.js:49 |
| 中危 | Missing Permission Declaration | index.js:46 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | WRITE | ✓ 一致 | index.js:49 - fs.rmSync used for cleanup |
| 命令执行 | NONE | WRITE | ✗ 越权 | index.js:49 - exec(git clone...) without doc declaration |
| 网络访问 | READ | WRITE | ✗ 越权 | index.js:134 - POST to external API with repo data |
| 环境变量 | NONE | NONE | — | API key hardcoded instead of env var usage |
1 高危 2 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY = "3ee94c45-6dad-4680-827c-eb3017420dff" index.js:7 中危 外部 URL 外部 URL
https://ark.cn-beijing.volces.com/api/v3/chat/completions index.js:134 目录结构
2 文件 · 5.9 KB · 210 行 JavaScript 1f · 147L
Markdown 1f · 63L
├─
index.js
JavaScript
└─
SKILL.md
Markdown
安全亮点
✓ Code has error handling with try-catch blocks
✓ Temporary directories are cleaned up after analysis
✓ Includes timeout protection for git clone (60000ms) and API calls (60000ms)
✓ No evidence of reverse shell, C2 communication, or deliberate data exfiltration to attacker-controlled infrastructure