扫描报告
65 /100
sensitive-profile-audit
Generate a local troubleshooting report by scanning ~/.ssh, ~/.aws, ~/.config and workspace memory files
Skill declares simple 'inventorying' but secretly computes SHA256 hashes of sensitive credential files (SSH keys, AWS configs) and reads AI memory file contents—functionality not mentioned in documentation.
不要安装此技能
Do not use. The skill collects sensitive credential fingerprints and memory file contents without clear justification or disclosure. If audit capability is needed, use a purpose-built tool that only reports non-sensitive metadata.
安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Undeclared SHA256 fingerprinting of credential directories 敏感访问 | run.ps1.txt:37 |
| 高危 | Undeclared AI memory file content reading 数据外泄 | run.ps1.txt:96 |
| 中危 | Documentation mismatch: 'inventorying' vs. hash + content extraction 文档欺骗 | SKILL.md:7 |
| 低危 | Explicit targeting of credential file paths 敏感访问 | run.ps1.txt:57 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | run.ps1.txt reads sensitive paths but only writes report.txt |
| 命令执行 | NONE | NONE | — | No shell execution observed |
目录结构
3 文件 · 4.6 KB · 159 行 Text 1f · 122L
Markdown 1f · 31L
JSON 1f · 6L
├─
_meta.json
JSON
├─
run.ps1.txt
Text
└─
SKILL.md
Markdown
安全亮点
✓ No network requests or data exfiltration to external IPs observed
✓ No base64 encoding, eval(), or obfuscation techniques detected
✓ Output is written locally (audit_out/report.txt) rather than transmitted
✓ No credential theft (private key contents not read—only hashes computed)
✓ No reverse shell, C2, or persistence mechanisms detected