Scan Report
75 /100
boss-ai-assistant
Boss直聘AI助理,自动监控未读消息、AI智能回复、自动发送简历、自动同意交换微信
This Boss直聘 automation script contains multiple critical security issues: hardcoded API credentials, external IP communication for data exfiltration, self-update from untrusted server, and undeclared behaviors.
Do not install this skill
Do not deploy. Requires complete rewrite with environment-based configuration, removal of hardcoded credentials, server-side data handling, and removal of self-update mechanism.
Attack Chain 5 steps
◎
Entry User installs script from documentation
SKILL.md:14⬡
Escalation Script extracts all HR conversations and personal data
scripts/boss_ai_assistant.js:130⬡
Escalation Data POSTed to external IP without consent
scripts/boss_ai_assistant.js:130⬡
Escalation External server can serve malicious update via updateURL
scripts/boss_ai_assistant.js:15◉
Impact Hardcoded API keys enable unauthorized resource usage
scripts/boss_ai_assistant.js:28Findings 8 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Hardcoded DashScope API Key Credential Theft | scripts/boss_ai_assistant.js:28 |
| Critical | Hardcoded Google Search API Key Credential Theft | scripts/boss_ai_assistant.js:36 |
| Critical | All Conversations Exfiltrated to External IP Data Exfil | scripts/boss_ai_assistant.js:130 |
| Critical | Self-Update from Untrusted External IP Supply Chain | scripts/boss_ai_assistant.js:15 |
| High | Personal Contact Information Hardcoded Sensitive Access | scripts/boss_ai_assistant.js:45 |
| High | Undeclared External Server Communication Doc Mismatch | SKILL.md:1 |
| High | Undeclared Automated Actions Doc Mismatch | scripts/boss_ai_assistant.js:199 |
| Medium | Bark Push Notification with Embedded Key Sensitive Access | scripts/boss_ai_assistant.js:29 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | NONE | WRITE | ✗ Violation | scripts/boss_ai_assistant.js:517 - POSTs to external APIs |
| Browser | NONE | WRITE | ✗ Violation | scripts/boss_ai_assistant.js:199-229 - Auto-clicks agree buttons |
1 Critical 3 High 15 findings
Critical API Key 硬编码 API 密钥
sk-22118c56659647e39ba847253e671062 scripts/boss_ai_assistant.js:28 High IP Address 硬编码 IP 地址
121.199.76.208 scripts/boss_ai_assistant.js:13 High API Key 疑似硬编码凭证
apiKey: 'sk-22118c56659647e39ba847253e671062' scripts/boss_ai_assistant.js:28 High API Key 疑似硬编码凭证
ApiKey: '1c58b249fc64bd1183c1075c8a9f81e142d197096c384ffe0e3bc096932c8847' scripts/boss_ai_assistant.js:36 Medium External URL 外部 URL
https://www.zhipin.com/web/geek/chat* SKILL.md:29 Medium External URL 外部 URL
https://dashscope.console.aliyun.com/ references/config.md:8 Medium External URL 外部 URL
https://programmablesearchengine.google.com/ references/config.md:14 Medium External URL 外部 URL
https://api.day.app/ references/config.md:19 Medium External URL 外部 URL
http://tampermonkey.net/ scripts/boss_ai_assistant.js:3 Medium External URL 外部 URL
https://www.google.com/s2/favicons?sz=64&domain=zhipin.com scripts/boss_ai_assistant.js:8 Medium External URL 外部 URL
http://121.199.76.208/boss_auto_greet.user.js scripts/boss_ai_assistant.js:15 Medium External URL 外部 URL
https://api.day.app/BMtjb8EnZjV6qsRH4pgaqY/ scripts/boss_ai_assistant.js:29 Medium External URL 外部 URL
http://121.199.76.208/hr_api.php scripts/boss_ai_assistant.js:35 Medium External URL 外部 URL
https://dashscope.aliyuncs.com/compatible-mode/v1/chat/completions scripts/boss_ai_assistant.js:517 Info Email 邮箱地址
[email protected] scripts/boss_ai_assistant.js:46 File Tree
3 files · 38.8 KB · 999 lines JavaScript 1f · 899L
Markdown 2f · 100L
├─
▾
references
│ └─
config.md
Markdown
├─
▾
scripts
│ └─
boss_ai_assistant.js
JavaScript
└─
SKILL.md
Markdown
Security Positives
✓ Script functionality matches stated purpose (Boss直聘 automation)
✓ No direct code obfuscation (base64, eval patterns not found)
✓ Uses standard Tampermonkey/ScriptCat API for cross-origin requests
✓ MutationObserver implementation is standard browser automation technique