扫描报告
0 /100
video-resizer
OpenClaw skill for Sparki AI video editing - aspect-ratio and platform-format conversion
Legitimate video editing CLI tool with clean codebase, well-documented behavior, and no security issues detected.
可以安装
This skill is safe to use. No action required.
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | cli.py:178 - opens user-provided video files for upload |
| 文件系统 | WRITE | WRITE | ✓ 一致 | client.py:108 - streams downloads to output_path; config.py:44 - writes config t… |
| 网络访问 | READ | READ | ✓ 一致 | client.py - all HTTP calls use httpx to agent-api.sparki.io only |
| 命令执行 | NONE | NONE | — | No subprocess, os.system, or shell execution found |
| 环境变量 | NONE | READ | ✓ 一致 | config.py:20 - reads SPARKI_API_KEY env var (legitimate, documented in _meta.jso… |
7 项发现
中危 外部 URL 外部 URL
https://img.shields.io/badge/ClawHub-Skill-blueviolet README.md:3 中危 外部 URL 外部 URL
https://clawhub.io README.md:3 中危 外部 URL 外部 URL
https://img.shields.io/badge/version-1.0.12-blue README.md:4 中危 外部 URL 外部 URL
https://sparki.io SKILL.md:17 中危 外部 URL 外部 URL
https://agent-api.sparki.io src/sparki_cli/constants.py:61 中危 外部 URL 外部 URL
https://t.me/Sparki_AI_bot/upload src/sparki_cli/constants.py:62 中危 外部 URL 外部 URL
https://sparki.io/pricing src/sparki_cli/constants.py:101 目录结构
11 文件 · 33.3 KB · 1010 行 Python 7f · 904L
Markdown 2f · 71L
TOML 1f · 31L
JSON 1f · 4L
├─
▾
src
│ └─
▾
sparki_cli
│ ├─
__init__.py
Python
│ ├─
cli.py
Python
│ ├─
client.py
Python
│ ├─
config.py
Python
│ ├─
constants.py
Python
│ ├─
models.py
Python
│ └─
output.py
Python
├─
_meta.json
JSON
├─
pyproject.toml
TOML
├─
README.md
Markdown
└─
SKILL.md
Markdown
依赖分析 3 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
typer | >=0.9.0 | pip | 否 | Legitimate CLI framework |
httpx | >=0.27.0 | pip | 否 | Legitimate HTTP client |
pydantic | >=2.0.0 | pip | 否 | Legitimate data validation library |
安全亮点
✓ No subprocess, shell execution, or command injection vectors
✓ No base64 encoding/decoding or code obfuscation
✓ No credential exfiltration - API key is stored locally, not transmitted elsewhere
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env files)
✓ No remote script execution (curl|bash, wget|sh)
✓ No eval(), exec(), or dynamic code execution
✓ No hidden functionality - all operations are visible in CLI commands
✓ Dependencies (typer, httpx, pydantic) are reputable and well-known
✓ Network communication restricted to declared domain (agent-api.sparki.io)
✓ Filesystem access limited to declared paths (CWD for reads, openclaw config dirs for writes)
✓ API key read from environment variable is standard, documented behavior