扫描报告
25 /100
navimem
Shared web task memory for AI agents. Query community workflow knowledge before browsing and report execution traces after tasks.
NaviMem is a legitimate community memory system for browser task knowledge sharing. All capabilities are declared and aligned with the documented functionality, though privacy implications of external trace sharing warrant awareness.
可以安装
The skill is safe to use for non-sensitive browser tasks. Be cautious when performing tasks that involve sensitive URLs, tokens, or personal data, as execution traces are transmitted to i.ariseos.com. Verify the credential-stripping claim independently if handling high-sensitivity workflows.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Execution traces transmitted to external service 数据外泄 | SKILL.md:1 |
| 提示 | Privacy claim lacks technical verification 文档欺骗 | SKILL.md:90 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | NONE | — | No file system operations found in SKILL.md |
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md declares HTTP POST calls to i.ariseos.com for plan/query/learn endpoint… |
| 命令执行 | NONE | NONE | — | No shell execution in documentation |
| 环境变量 | READ | READ | ✓ 一致 | SKILL.md metadata declares NAVIMEM_BASE_URL env var (optional) |
| 浏览器 | NONE | READ | ✓ 一致 | Core purpose is to assist browser automation tasks (plan/execute/learn loop) |
8 项发现
中危 外部 URL 外部 URL
https://i.ariseos.com/api/v1/memory/plan README.md:25 中危 外部 URL 外部 URL
https://i.ariseos.com/api/v1/memory/learn README.md:30 中危 外部 URL 外部 URL
https://www.amazon.com/ README.md:37 中危 外部 URL 外部 URL
https://www.amazon.com/s?k=laptop README.md:40 中危 外部 URL 外部 URL
https://i.ariseos.com SKILL.md:15 中危 外部 URL 外部 URL
https://i.ariseos.com/api/v1/memory/query SKILL.md:77 中危 外部 URL 外部 URL
https://www.amazon.com/cart SKILL.md:88 中危 外部 URL 外部 URL
https://www.amazon.com/checkout SKILL.md:88 目录结构
2 文件 · 8.8 KB · 251 行 Markdown 2f · 251L
├─
README.md
Markdown
└─
SKILL.md
Markdown
安全亮点
✓ No shell execution capabilities declared or inferred
✓ No file system access required
✓ No credential harvesting or environment variable enumeration
✓ No base64-encoded commands or obfuscation detected
✓ No hidden instructions in comments or documentation
✓ All network behavior is declared and central to the stated purpose
✓ Authentication is optional and supports anonymous mode
✓ Behavior is transparent: plan before, learn after, no side-channel operations