扫描报告
75 /100
boss-ai-assistant
Boss直聘AI助理,自动监控未读消息、AI智能回复、自动发送简历、自动同意交换微信
This Boss直聘 automation script contains multiple critical security issues: hardcoded API credentials, external IP communication for data exfiltration, self-update from untrusted server, and undeclared behaviors.
不要安装此技能
Do not deploy. Requires complete rewrite with environment-based configuration, removal of hardcoded credentials, server-side data handling, and removal of self-update mechanism.
攻击链 5 步
◎
入口 User installs script from documentation
SKILL.md:14⬡
提权 Script extracts all HR conversations and personal data
scripts/boss_ai_assistant.js:130⬡
提权 Data POSTed to external IP without consent
scripts/boss_ai_assistant.js:130⬡
提权 External server can serve malicious update via updateURL
scripts/boss_ai_assistant.js:15◉
影响 Hardcoded API keys enable unauthorized resource usage
scripts/boss_ai_assistant.js:28安全发现 8 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Hardcoded DashScope API Key 凭证窃取 | scripts/boss_ai_assistant.js:28 |
| 严重 | Hardcoded Google Search API Key 凭证窃取 | scripts/boss_ai_assistant.js:36 |
| 严重 | All Conversations Exfiltrated to External IP 数据外泄 | scripts/boss_ai_assistant.js:130 |
| 严重 | Self-Update from Untrusted External IP 供应链 | scripts/boss_ai_assistant.js:15 |
| 高危 | Personal Contact Information Hardcoded 敏感访问 | scripts/boss_ai_assistant.js:45 |
| 高危 | Undeclared External Server Communication 文档欺骗 | SKILL.md:1 |
| 高危 | Undeclared Automated Actions 文档欺骗 | scripts/boss_ai_assistant.js:199 |
| 中危 | Bark Push Notification with Embedded Key 敏感访问 | scripts/boss_ai_assistant.js:29 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | NONE | WRITE | ✗ 越权 | scripts/boss_ai_assistant.js:517 - POSTs to external APIs |
| 浏览器 | NONE | WRITE | ✗ 越权 | scripts/boss_ai_assistant.js:199-229 - Auto-clicks agree buttons |
1 严重 3 高危 15 项发现
严重 API 密钥 硬编码 API 密钥
sk-22118c56659647e39ba847253e671062 scripts/boss_ai_assistant.js:28 高危 IP 地址 硬编码 IP 地址
121.199.76.208 scripts/boss_ai_assistant.js:13 高危 API 密钥 疑似硬编码凭证
apiKey: 'sk-22118c56659647e39ba847253e671062' scripts/boss_ai_assistant.js:28 高危 API 密钥 疑似硬编码凭证
ApiKey: '1c58b249fc64bd1183c1075c8a9f81e142d197096c384ffe0e3bc096932c8847' scripts/boss_ai_assistant.js:36 中危 外部 URL 外部 URL
https://www.zhipin.com/web/geek/chat* SKILL.md:29 中危 外部 URL 外部 URL
https://dashscope.console.aliyun.com/ references/config.md:8 中危 外部 URL 外部 URL
https://programmablesearchengine.google.com/ references/config.md:14 中危 外部 URL 外部 URL
https://api.day.app/ references/config.md:19 中危 外部 URL 外部 URL
http://tampermonkey.net/ scripts/boss_ai_assistant.js:3 中危 外部 URL 外部 URL
https://www.google.com/s2/favicons?sz=64&domain=zhipin.com scripts/boss_ai_assistant.js:8 中危 外部 URL 外部 URL
http://121.199.76.208/boss_auto_greet.user.js scripts/boss_ai_assistant.js:15 中危 外部 URL 外部 URL
https://api.day.app/BMtjb8EnZjV6qsRH4pgaqY/ scripts/boss_ai_assistant.js:29 中危 外部 URL 外部 URL
http://121.199.76.208/hr_api.php scripts/boss_ai_assistant.js:35 中危 外部 URL 外部 URL
https://dashscope.aliyuncs.com/compatible-mode/v1/chat/completions scripts/boss_ai_assistant.js:517 提示 邮箱 邮箱地址
[email protected] scripts/boss_ai_assistant.js:46 目录结构
3 文件 · 38.8 KB · 999 行 JavaScript 1f · 899L
Markdown 2f · 100L
├─
▾
references
│ └─
config.md
Markdown
├─
▾
scripts
│ └─
boss_ai_assistant.js
JavaScript
└─
SKILL.md
Markdown
安全亮点
✓ Script functionality matches stated purpose (Boss直聘 automation)
✓ No direct code obfuscation (base64, eval patterns not found)
✓ Uses standard Tampermonkey/ScriptCat API for cross-origin requests
✓ MutationObserver implementation is standard browser automation technique