扫描报告
15 /100
mia-trust
MIA-Trust Pipeline - Memory-Intelligent Assistant Trust Guard + Memory Evolution
MIA-Trust is a legitimate security guard pipeline that performs prompt injection detection, plan evaluation, and memory management. The skill has minor documentation gaps (undeclared execSync usage) but no malicious behavior detected.
可以安装
Add explicit documentation of execSync child process spawning and API key environment variable usage in SKILL.md. No blocking actions needed.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Undeclared child process execution | run.mjs:42 |
| 提示 | API key environment variable access | run.mjs, trust/mia-trust.mjs:28 |
| 提示 | Query injection in execSync (mitigated) | run.mjs:45 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✗ 越权 | run.mjs:42 - execSync spawns child node processes |
| 网络访问 | NONE | READ | ✓ 一致 | planner/mia-planner.mjs:65, trust/mia-trust.mjs - API calls to external endpoint… |
| 文件系统 | NONE | WRITE | ✓ 一致 | memory/mia-memory.mjs:appendFileSync, trust/mia-trust.mjs - writes to memory.jso… |
| 环境变量 | NONE | READ | ✗ 越权 | run.mjs:28-36, trust/mia-trust.mjs:10-14 - reads API keys from process.env |
3 项发现
中危 外部 URL 外部 URL
https://your-api-endpoint/v1/chat/completions PIPELINE.md:134 中危 外部 URL 外部 URL
https://paypal.me/jimmywarting package-lock.json:35 中危 外部 URL 外部 URL
https://opencollective.com/node-fetch package-lock.json:94 目录结构
11 文件 · 211.5 KB · 3056 行 JavaScript 6f · 2064L
JSON 3f · 716L
Markdown 2f · 276L
├─
▾
feedback
│ └─
mia-feedback.mjs
JavaScript
├─
▾
memory
│ └─
mia-memory.mjs
JavaScript
├─
▾
planner
│ └─
mia-planner.mjs
JavaScript
├─
▾
trust
│ ├─
mia-trust.mjs
JavaScript
│ └─
trust_experience.json
JSON
├─
_sync_trust_exp.mjs
JavaScript
├─
package-lock.json
JSON
├─
package.json
JSON
├─
PIPELINE.md
Markdown
├─
run.mjs
JavaScript
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
node-fetch | ^3.3.2 | npm | 否 | Modern fetch implementation, no known vulnerabilities |
安全亮点
✓ Purpose is clearly legitimate: prompt injection detection and plan security evaluation
✓ Implements multi-layer security: regex scanning + LLM deep analysis + historical experience
✓ Uses constitutional principles for safety evaluation (Authenticity, Safety, Privacy, Robustness, Fairness)
✓ Memory storage is for legitimate experience tracking, not credential harvesting
✓ No base64 decoding, direct IP connections, or C2 communication patterns
✓ API calls are to user-configured endpoints only (no hardcoded exfiltration URLs)
✓ Includes anti-bypass patterns for common prompt injection techniques
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env files outside normal config