扫描报告
72 /100
claw-ops-manager
OpenClaw operations management center with audit logging, snapshots, and rollback
The skill executes arbitrary shell commands via subprocess without explicit declaration, monitors and snapshots sensitive credential paths (~/.ssh, /etc/ssh) without stated justification, and includes documentation examples of destructive commands.
不要安装此技能
Do not deploy without major security rework. The skill requires explicit shell:WRITE permission declaration, removal of sensitive paths from auto-snapshot configuration, and clear documentation explaining why credential directories are monitored.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Undeclared Shell Command Execution 权限提升 | scripts/audited_ops.py:240 |
| 高危 | Sensitive Credential Paths in Auto-Snapshot 敏感访问 | scripts/audited_ops.py:36 |
| 高危 | Sensitive Paths in Default Protected Paths 敏感访问 | scripts/init.py:114 |
| 中危 | Shell Eval Usage in Wrapper 代码执行 | scripts/audit_wrapper.sh:55 |
| 中危 | Dangerous Command Examples in Documentation 文档欺骗 | COMPLETED_v2.md:10 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✗ 越权 | scripts/audited_ops.py:240 - subprocess.run(command, shell=True) |
| 文件系统 | READ | WRITE | ✗ 越权 | scripts/audited_ops.py:262-270 - writes files for snapshots |
| 环境变量 | NONE | READ | ✗ 越权 | scripts/audited_ops.py:28 - os.environ.get('USER'), scripts/auto_audit.py:26 - o… |
2 严重 7 项发现
严重 危险命令 危险 Shell 命令
rm -rf ~ COMPLETED_v2.md:10 严重 危险命令 危险 Shell 命令
rm -rf / MARKETING.md:45 中危 外部 URL 外部 URL
https://img.shields.io/badge/ClawHub-v2.0.0-667eea?style=for-the-badge MARKETING.md:97 中危 外部 URL 外部 URL
https://clawhub.com/package/claw-ops-manager MARKETING.md:97 中危 外部 URL 外部 URL
https://img.shields.io/badge/ClawHub-v2.0.0-667eea OPTIMIZED_METADATA.md:101 中危 外部 URL 外部 URL
https://cdn.plot.ly/plotly-latest.min.js assets/templates/dashboard.html:7 提示 邮箱 邮箱地址
[email protected] scripts/snapshot.py:37 目录结构
27 文件 · 333.4 KB · 10830 行 Python 13f · 7147L
HTML 3f · 1777L
Markdown 7f · 1461L
Shell 2f · 258L
JSON 2f · 187L
├─
▾
assets
│ └─
▾
templates
│ ├─
dashboard_v2.html
HTML
│ ├─
dashboard_v3.html
HTML
│ └─
dashboard.html
HTML
├─
▾
references
│ └─
api.md
Markdown
├─
▾
scripts
│ ├─
audit_wrapper.sh
Shell
│ ├─
audited_ops.py
Python
│ ├─
auto_audit.py
Python
│ ├─
describer.py
Python
│ ├─
init.py
Python
│ ├─
logger.py
Python
│ ├─
monitor.py
Python
│ ├─
rollback.py
Python
│ ├─
server_full.py
Python
│ ├─
server_simple.py
Python
│ ├─
server_v2.py
Python
│ ├─
server_v3.py
Python
│ ├─
server.py
Python
│ ├─
setup_auto_audit.sh
Shell
│ └─
snapshot.py
Python
├─
▾
translations
│ └─
operations.json
JSON
├─
_meta.json
JSON
├─
COMPLETED_v2.md
Markdown
├─
INTEGRATION.md
Markdown
├─
MARKETING.md
Markdown
├─
OPTIMIZED_METADATA.md
Markdown
├─
SKILL.md
Markdown
└─
USAGE_v2.md
Markdown
依赖分析 3 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
flask | not specified | pip | 否 | Listed in SKILL.md dependencies but not pinned |
watchdog | not specified | pip | 否 | Listed in SKILL.md dependencies but not pinned |
plotly | not specified | pip | 否 | Listed in SKILL.md dependencies but not pinned |
安全亮点
✓ No credential harvesting or exfiltration code detected
✓ No network exfiltration to external servers
✓ No base64 encoding or obfuscated malicious code
✓ No reverse shell or C2 communication patterns
✓ No hidden HTML comments with malicious instructions
✓ Includes permission checking before operations
✓ Database uses SQLite with proper schema design
✓ Supports dry-run mode for rollback operations