Scan Report
20 /100
message-hub
Message Hub - AI Team Message Hub Client for async collaboration
A legitimate message-hub Python client that uses network requests for hub communication, with minor documentation gaps (undeclared network permission, example API keys in docs) but no malicious behavior detected.
Safe to install
Declare network:READ in SKILL.md allowed-tools if the skill is intended to use the requests library. Replace example API key placeholders in README.md with clearly-labeled placeholder strings. Fix the syntax error in hub_client.py line 211.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | Undeclared network resource usage Doc Mismatch | hub_client.py:77 |
| Low | Example API key patterns in documentation Doc Mismatch | README.md:29 |
| Low | Syntax error prevents CLI from running RCE | hub_client.py:211 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | NONE | READ | ✓ Aligned | hub_client.py:77 — self.session.request(method, url, json=data, timeout=30) |
| Filesystem | NONE | NONE | — | No file read/write operations in code |
| Shell | NONE | NONE | — | No shell command execution |
| Environment | NONE | READ | ✓ Aligned | hub_client.py:54 — os.getenv reads MESSAGE_HUB_URL, MESSAGE_HUB_API_KEY, MESSAGE… |
3 High 3 findings
High API Key 疑似硬编码凭证
API_KEY="sk_xb_xxxxxxxxxxxxxxxx" README.md:29 High API Key 疑似硬编码凭证
api_key="sk_xb_xxxxxxxxxxxxxxxx" README.md:47 High API Key 疑似硬编码凭证
api_key="sk_xj_xxxxxxxxxxxxxxxx" README.md:134 File Tree
4 files · 26.4 KB · 891 lines Python 2f · 576L
Markdown 2f · 315L
├─
hub_client.py
Python
├─
message_hub.py
Python
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
requests | * | pip | No | Version not pinned; requests is used for core network functionality (legitimate) |
Security Positives
✓ No shell execution, no subprocess calls, no os.system or popen usage
✓ No credential harvesting or environment variable enumeration for exfiltration
✓ No base64 encoding, obfuscation, or eval/atob patterns
✓ No sensitive file access (~/.ssh, ~/.aws, .env reading for theft)
✓ No curl|bash, wget|sh, or remote script execution
✓ No reverse shell, C2, or data exfiltration endpoints
✓ No hidden HTML instructions or prompt injection payloads
✓ HMAC signature uses API key legitimately for message authentication only
✓ API key is used only for X-API-Key header, not transmitted to third parties
✓ requests library version is unpinned but has no known critical vulnerabilities at time of analysis