Scan Report
18 /100
zentao-api
调用禅道(ZenTao)RESTful API v2.0 完成用户请求,覆盖项目集、产品、项目、执行、需求、Bug、任务、测试用例等20个模块的增删改查及状态流转操作
A legitimate ZenTao API wrapper skill with documented filesystem token caching and shell script execution, carrying minor security concerns around plaintext password exposure in process arguments.
Safe to install
Accept for use. Consider warning users that passwords appear in process arguments and that cached tokens are stored in plaintext on disk.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Plaintext password visible in process arguments Credential Theft | scripts/get-token.sh:74 |
| Low | Permanent token cached in plaintext on filesystem Sensitive Access | scripts/get-token.sh:81 |
| Low | SKILL.md does not disclose credential caching to disk in the prominent configuration section Doc Mismatch | SKILL.md:13 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | SKILL.md writes ~/.zentao-token.json |
| Shell | WRITE | WRITE | ✓ Aligned | SKILL.md runs eval "$(bash scripts/get-token.sh)" |
| Network | READ | READ | ✓ Aligned | REST API calls to ZENTAO_URL/api.php/v2 endpoints |
| Environment | READ | READ | ✓ Aligned | Reads ZENTAO_URL, ZENTAO_TOKEN, ZENTAO_ACCOUNT, ZENTAO_PASSWORD from env |
| Clipboard | NONE | NONE | — | |
| Browser | NONE | NONE | — | |
| Database | NONE | NONE | — | |
| Skill Invoke | NONE | NONE | — |
3 findings
Medium External URL 外部 URL
http://zentao.example.com SKILL.md:14 Medium External URL 外部 URL
https://www.zentao.net/book/api/2309.html SKILL.md:207 Medium External URL 外部 URL
https://www.zentao.net/book/api/1397.html SKILL.md:208 File Tree
3 files · 31.2 KB · 745 lines Markdown 2f · 644L
Shell 1f · 101L
├─
▾
scripts
│ └─
get-token.sh
⚠
Shell
├─
api-reference.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No obfuscation or base64-encoded payloads found
✓ No unauthorized network exfiltration or C2 communication
✓ No access to sensitive paths outside the documented cache file (~/.zentao-token.json)
✓ No credential harvesting beyond what is necessary for the ZenTao API
✓ API operations are limited to the declared ZenTao REST API endpoints only
✓ No hidden instructions or prompt injection detected
✓ Shell script dependencies (curl, node) are standard tools with no malicious behavior
✓ No supply chain risks identified; no external dependencies or package managers used