Scan Report
5 /100
electron-audit
Electron 桌面应用全攻击面安全审计 - Comprehensive security auditing guide for Electron desktop applications
This is a legitimate security auditing skill for Electron applications consisting entirely of documentation files with no executable code. All references to attacker infrastructure are educational examples explaining attack patterns for security testing purposes.
Safe to install
This skill is safe to use. No action required. The skill provides comprehensive guidance for security researchers to audit Electron applications.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Info | Attacker domain references in documentation | references/PROTOCOL_RCE.md, references/JS_BRIDGE_EXPLOIT.md, references/XSS_TO_RCE.md, references/FUSE_BINARY_EXPLOIT.md:Various |
| Info | Comprehensive attack methodology documentation | SKILL.md and all references/*.md:Various |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | No script files present, only documentation |
| Network | NONE | NONE | — | No network access required, documentation-only skill |
| Shell | NONE | NONE | — | No shell commands in skill, references are command examples in documentation |
| Environment | NONE | NONE | — | No environment variable access |
| Skill Invoke | NONE | NONE | — | Documentation skill, no sub-skill invocation |
| Clipboard | NONE | NONE | — | Not accessed |
| Browser | NONE | NONE | — | Documentation skill |
| Database | NONE | NONE | — | Not accessed |
23 findings
Medium External URL 外部 URL
http://127.0.0.1:9222 SKILL.md:300 Medium External URL 外部 URL
https://evil.com SKILL.md:502 Medium External URL 外部 URL
https://www.electronjs.org/blog/tags/security references/CONFIG_AUDIT.md:185 Medium External URL 外部 URL
https://chromereleases.googleblog.com/ references/CONFIG_AUDIT.md:186 Medium External URL 外部 URL
https://releases.electronjs.org/ references/ELECTRON_CVE_DATABASE.md:70 Medium External URL 外部 URL
https://v8.dev/blog references/ELECTRON_CVE_DATABASE.md:131 Medium External URL 外部 URL
https://nodejs.org/en/blog/vulnerability references/ELECTRON_CVE_DATABASE.md:190 Medium External URL 外部 URL
http://attacker.com/shell.ps1\\\ references/FUSE_BINARY_EXPLOIT.md:53 Medium External URL 外部 URL
https://attacker.com/beacon?host= references/FUSE_BINARY_EXPLOIT.md:329 Medium External URL 外部 URL
https://attacker.com/log?data= references/JS_BRIDGE_EXPLOIT.md:324 Medium External URL 外部 URL
https://attacker.com/log?env= references/JS_BRIDGE_EXPLOIT.md:327 Medium External URL 外部 URL
https://attacker.com/log?c= references/PROTOCOL_RCE.md:95 Medium External URL 外部 URL
https://evil.com/phishing.html references/PROTOCOL_RCE.md:133 Medium External URL 外部 URL
https://attacker.com references/PROTOCOL_RCE.md:231 Medium External URL 外部 URL
https://untrusted.com references/PROTOCOL_RCE.md:383 Medium External URL 外部 URL
https://cdn.example.com/lib.js references/SUPPLY_CHAIN.md:184 Medium External URL 外部 URL
https://attacker.com/log?key= references/XSS_TO_RCE.md:140 Medium External URL 外部 URL
https://attacker.com/?c= references/XSS_TO_RCE.md:234 Medium External URL 外部 URL
https://attacker.com/?ls= references/XSS_TO_RCE.md:237 Medium External URL 外部 URL
https://attacker.com/?k= references/XSS_TO_RCE.md:240 Medium External URL 外部 URL
https://attacker.com/phish references/XSS_TO_RCE.md:243 Medium External URL 外部 URL
https://hooks\.slack\.com/services/T[A-Z0-9 rules/sensitive_patterns.txt:37 Medium External URL 外部 URL
https://discord(app rules/sensitive_patterns.txt:38 File Tree
12 files · 138.6 KB · 4525 lines Markdown 11f · 4439L
Text 1f · 86L
├─
▾
references
│ ├─
CONFIG_AUDIT.md
Markdown
│ ├─
DEVTOOLS_BYPASS.md
Markdown
│ ├─
ELECTRON_CVE_DATABASE.md
Markdown
│ ├─
FUSE_BINARY_EXPLOIT.md
Markdown
│ ├─
JS_BRIDGE_EXPLOIT.md
Markdown
│ ├─
LOCAL_DATA_ANALYSIS.md
Markdown
│ ├─
OUTPUT_TEMPLATE.md
Markdown
│ ├─
PROTOCOL_RCE.md
Markdown
│ ├─
SUPPLY_CHAIN.md
Markdown
│ └─
XSS_TO_RCE.md
Markdown
├─
▾
rules
│ └─
sensitive_patterns.txt
Text
└─
SKILL.md
Markdown
Security Positives
✓ No executable code present - purely documentation
✓ No credential harvesting or exfiltration mechanisms
✓ No C2 infrastructure or command-and-control patterns
✓ No reverse shells or backdoors
✓ No supply chain risks (no dependencies to install)
✓ Well-structured security audit methodology for legitimate purposes
✓ Includes anti-pattern rules to prevent false positives in reports
✓ Contains false positive filtering rules for responsible disclosure