Scan Report
45 /100
gequhai-music
歌曲海音乐搜索与下载技能 - Search and download music from gequhai.com to Synology NAS
Skill contains hardcoded Synology credentials and base64 obfuscation for download URLs without full disclosure in documentation, presenting significant security risks for credential exposure and unauthorized NAS access.
Use with caution
Remove hardcoded credentials from source code and use environment variables or secure credential storage. Declare all credential usage in SKILL.md. Consider if base64 obfuscation of download URLs is necessary or could be simplified.
Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| High | Hardcoded Synology password not declared in documentation Credential Theft | scripts/gequhai_crawler.py:215 |
| Medium | Base64 obfuscation for download URLs Obfuscation | scripts/gequhai_crawler.py:52 |
| Medium | Undeclared filesystem write capability Doc Mismatch | scripts/gequhai_crawler.py:30 |
| Low | Auto-registration to configurable gateway URL Priv Escalation | service/main.py:135 |
| Info | Hardcoded local network IP address Sensitive Access | scripts/gequhai_crawler.py:211 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ | READ | ✓ Aligned | Makes HTTP requests to gequhai.com |
| Shell | NONE | NONE | — | No subprocess/shell execution detected |
| Filesystem | NONE | WRITE | ✗ Violation | Writes to data/ directory and Synology NAS |
| Database | NONE | NONE | — | No database access |
1 High 5 findings
High IP Address 硬编码 IP 地址
120.0.0.0 scripts/gequhai_crawler.py:30 Medium External URL 外部 URL
https://www.gequhai.com/ SKILL.md:26 Medium External URL 外部 URL
https://pan.quark.cn/s/276fd9172e63 data/download_info.json:30 Medium External URL 外部 URL
https://lv-sycdn.kuwo.cn/2d44367307dca6de508dc3d6437ca393/69b35b17/resource/30106/trackmedia/M500002eyjaI0NYQfW.mp3 data/download_info.json:31 Medium External URL 外部 URL
https://www.gequhai.com scripts/gequhai_crawler.py:20 File Tree
16 files · 59.2 KB · 1987 lines Python 10f · 1626L
JSON 4f · 224L
Markdown 1f · 133L
Text 1f · 4L
├─
▾
data
│ ├─
download_info.json
JSON
│ ├─
jj_search.json
JSON
│ ├─
ranking.json
JSON
│ └─
rename_queue.json
JSON
├─
▾
scripts
│ ├─
gequhai_crawler.py
Python
│ ├─
get_hot.py
Python
│ ├─
get_ranking_file.py
Python
│ ├─
get_ranking_json.py
Python
│ ├─
get_ranking.py
Python
│ ├─
search_download.py
Python
│ ├─
search_jj_new.py
Python
│ ├─
search_jj.py
Python
│ └─
test_search.py
Python
├─
▾
service
│ ├─
main.py
Python
│ └─
requirements.txt
Text
└─
SKILL.md
Markdown
Dependencies 5 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
requests | >=2.32.0 | requirements.txt | No | Pinned minimum version |
beautifulsoup4 | * | gequhai_crawler.py | No | Imported but not in requirements |
fastapi | >=0.115.0 | requirements.txt | No | Pinned minimum version |
uvicorn | >=0.32.0 | requirements.txt | No | Pinned minimum version |
httpx | >=0.27.0 | requirements.txt | No | Pinned minimum version |
Security Positives
✓ No evidence of credential exfiltration - credentials used only for legitimate NAS access
✓ No reverse shell, C2 communication, or data theft behavior detected
✓ API authentication key is properly documented in SKILL.md
✓ Uses standard HTTP libraries (requests, httpx) without suspicious patterns
✓ No attempts to access sensitive paths like ~/.ssh, ~/.aws, or .env files
✓ No curl|bash or wget|sh remote script execution patterns