Trusted — Risk Score 5/100
Last scan:20 hr ago Rescan
5 /100
smartpi-iot
智能公元 IoT 设备控制插件。可控制灯光、加湿器、窗帘等设备,支持查询设备状态。
This is a pure-documentation IoT device control skill with no executable code, no scripts, and no hidden functionality — all network access is explicitly declared via curl commands documented in SKILL.md.
Skill Namesmartpi-iot
Duration26.4s
Enginepi
Safe to install
No action needed. The skill is safe to use. Consider pinning the curl version for reproducibility.

Findings 2 items

Severity Finding Location
Low
Hardcoded device ID in all API examples Doc Mismatch
All curl command examples contain the hardcoded device ID 1773819411753. While this makes the examples immediately copy-pasteable, it suggests these are real operational examples rather than generic templates. Users should be warned to replace this with their own device ID.
curl -X POST https://mcp.aimachip.com/plugin/control/switch_1/1773819411753
→ Replace the hardcoded ID with a placeholder like YOUR_DEVICE_ID in documentation examples.
SKILL.md:72
Low
Credentials exposed in curl command history Sensitive Access
API tokens (SMARTPI_TOKEN) and device keys are embedded directly in curl command-line arguments, which means they can appear in shell history files (~/.bash_history) and process listings (ps).
..."token": "'\$SMARTPI_TOKEN'"...
→ Consider documenting the use of a session cookie or OAuth flow instead of embedding tokens in every request. Alternatively, document how to set a HISTIGNORE pattern for these commands.
SKILL.md:72
ResourceDeclaredInferredStatusEvidence
Network READ READ ✓ Aligned SKILL.md: all curl commands use POST to https://mcp.aimachip.com for device cont…
Shell WRITE NONE ✓ Aligned SKILL.md metadata declares requires.bins: ['curl'], but no actual shell executio…
Filesystem NONE NONE No file reads or writes referenced; iot-control.sh script is only a documentatio…
Environment READ READ ✓ Aligned SKILL.md declares SMARTPI_TOKEN and SMARTPI_DEVICE_KEY env vars; values are used…
Skill Invoke NONE NONE No cross-skill invocation observed
Clipboard NONE NONE No clipboard access
Browser NONE NONE No browser access
Database NONE NONE No database access
10 findings
🔗
Medium External URL 外部 URL
https://smartpi.cn/
SKILL.md:6
🔗
Medium External URL 外部 URL
https://mcp.aimachip.com
SKILL.md:60
🔗
Medium External URL 外部 URL
https://mcp.aimachip.com/plugin/control/switch_1/1773819411753
SKILL.md:72
🔗
Medium External URL 外部 URL
https://mcp.aimachip.com/plugin/query/switch_1/1773819411753
SKILL.md:88
🔗
Medium External URL 外部 URL
https://mcp.aimachip.com/plugin/control/slider_1/1773819411753
SKILL.md:100
🔗
Medium External URL 外部 URL
https://mcp.aimachip.com/plugin/query/slider_1/1773819411753
SKILL.md:116
🔗
Medium External URL 外部 URL
https://mcp.aimachip.com/plugin/control/power_1/1773819411753
SKILL.md:132
🔗
Medium External URL 外部 URL
https://mcp.aimachip.com/plugin/query/power_1/1773819411753
SKILL.md:148
🔗
Medium External URL 外部 URL
https://mcp.aimachip.com/plugin/control/switch_2/1773819411753
SKILL.md:164
🔗
Medium External URL 外部 URL
https://mcp.aimachip.com/plugin/query/switch_2/1773819411753
SKILL.md:180

File Tree

1 files · 6.8 KB · 305 lines
Markdown 1f · 305L
└─ 📝 SKILL.md Markdown 305L · 6.8 KB

Security Positives

✓ No executable code or scripts present — only documentation
✓ No dependencies (no requirements.txt, package.json, etc.) — no supply chain risk
✓ All network access is explicitly documented via curl commands
✓ No obfuscation, base64, or hidden instructions
✓ No sensitive file/directory access (no ~/.ssh, ~/.aws, .env reads)
✓ No credential exfiltration — tokens only sent to the declared API endpoint
✓ No reverse shell, C2, or data theft patterns
✓ No prompt injection or hidden instructions
✓ MIT license declared with author attribution
✓ Credential security warning present (do not commit tokens to version control)