扫描报告
18 /100
zentao-api
调用禅道(ZenTao)RESTful API v2.0 完成用户请求,覆盖项目集、产品、项目、执行、需求、Bug、任务、测试用例等20个模块的增删改查及状态流转操作
A legitimate ZenTao API wrapper skill with documented filesystem token caching and shell script execution, carrying minor security concerns around plaintext password exposure in process arguments.
可以安装
Accept for use. Consider warning users that passwords appear in process arguments and that cached tokens are stored in plaintext on disk.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Plaintext password visible in process arguments 凭证窃取 | scripts/get-token.sh:74 |
| 低危 | Permanent token cached in plaintext on filesystem 敏感访问 | scripts/get-token.sh:81 |
| 低危 | SKILL.md does not disclose credential caching to disk in the prominent configuration section 文档欺骗 | SKILL.md:13 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | SKILL.md writes ~/.zentao-token.json |
| 命令执行 | WRITE | WRITE | ✓ 一致 | SKILL.md runs eval "$(bash scripts/get-token.sh)" |
| 网络访问 | READ | READ | ✓ 一致 | REST API calls to ZENTAO_URL/api.php/v2 endpoints |
| 环境变量 | READ | READ | ✓ 一致 | Reads ZENTAO_URL, ZENTAO_TOKEN, ZENTAO_ACCOUNT, ZENTAO_PASSWORD from env |
| 剪贴板 | NONE | NONE | — | |
| 浏览器 | NONE | NONE | — | |
| 数据库 | NONE | NONE | — | |
| 技能调用 | NONE | NONE | — |
3 项发现
中危 外部 URL 外部 URL
http://zentao.example.com SKILL.md:14 中危 外部 URL 外部 URL
https://www.zentao.net/book/api/2309.html SKILL.md:207 中危 外部 URL 外部 URL
https://www.zentao.net/book/api/1397.html SKILL.md:208 目录结构
3 文件 · 31.2 KB · 745 行 Markdown 2f · 644L
Shell 1f · 101L
├─
▾
scripts
│ └─
get-token.sh
⚠
Shell
├─
api-reference.md
Markdown
└─
SKILL.md
Markdown
安全亮点
✓ No obfuscation or base64-encoded payloads found
✓ No unauthorized network exfiltration or C2 communication
✓ No access to sensitive paths outside the documented cache file (~/.zentao-token.json)
✓ No credential harvesting beyond what is necessary for the ZenTao API
✓ API operations are limited to the declared ZenTao REST API endpoints only
✓ No hidden instructions or prompt injection detected
✓ Shell script dependencies (curl, node) are standard tools with no malicious behavior
✓ No supply chain risks identified; no external dependencies or package managers used