Scan Report
65 /100
huo15-memory-evolution
火一五记忆进化技能 - 四类分类体系记忆系统改造
Critical: hardcoded API key exposed in source code at scripts/dream.sh:79 enables unauthorized API usage if repository is accessed.
Do not install this skill
IMMEDIATE: Remove the hardcoded API key from scripts/dream.sh and use environment variable instead. Rotate the exposed API key immediately.
Attack Chain 3 steps
⬡
Escalation Attacker gains read access to repository (public repo, insider threat, or leaked credentials)
N/A⬡
Escalation Attacker extracts hardcoded API key from scripts/dream.sh:79
scripts/dream.sh:79◉
Impact Attacker uses extracted API key to make unauthorized calls to MiniMax API at api.minimaxi.com, incurring costs to the victim's account
N/AFindings 3 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Hardcoded API Key in Source Code Credential Theft | scripts/dream.sh:79 |
| High | Undeclared Network Access Doc Mismatch | scripts/dream.sh:89 |
| Medium | Undeclared Filesystem Write to ~/.openclaw/ Sensitive Access | scripts/install.sh:53 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | WRITE | ✓ Aligned | install.sh, migrate.sh, batch-install.sh write to ~/.openclaw/ without explicit … |
| Network | NONE | WRITE | ✗ Violation | dream.sh:89 - curl POST to api.minimaxi.com with API key |
| Environment | NONE | READ | ✓ Aligned | OC_AGENT_ID environment variable read for routing - legitimate behavior document… |
1 High 5 findings
High API Key 疑似硬编码凭证
API_KEY="sk-cp-pD1WY6KcHeUNXDeKmG4ZnzDch-sXsZKmAsNn7rXZDoAbGwc7u6XJn55Z6GbgW3qngTC-i5geM4PzDwkaSj8sQUSk2TPPj-lrLc-Yamjn-... scripts/dream.sh:79 Medium External URL 外部 URL
https://api.minimaxi.com/v1/text/chatcompletion_v2 scripts/dream.sh:80 Info Email 邮箱地址
[email protected] scripts/MIGRATION-REPORT-2026-04-04.md:35 Info Email 邮箱地址
[email protected] scripts/MIGRATION-REPORT-2026-04-04.md:38 Info Email 邮箱地址
[email protected] scripts/MIGRATION-REPORT-2026-04-04.md:39 File Tree
16 files · 55.6 KB · 2108 lines Shell 8f · 1468L
Markdown 4f · 436L
JSON 2f · 113L
JavaScript 1f · 65L
Text 1f · 26L
├─
▾
config
│ ├─
agent-routing.js
JavaScript
│ └─
memory-types.json
JSON
├─
▾
scripts
│ ├─
▾
snapshots
│ │ └─
snapshot-info-2026-04-04-234219.txt
Text
│ ├─
batch-install.sh
Shell
│ ├─
check-drift.sh
Shell
│ ├─
dream.sh
Shell
│ ├─
INSTALL-REPORT-2026-04-04.md
Markdown
│ ├─
install.sh
Shell
│ ├─
migrate.sh
Shell
│ ├─
MIGRATION-REPORT-2026-04-04.md
Markdown
│ ├─
rollback.sh
Shell
│ ├─
snapshot.sh
Shell
│ └─
verify.sh
Shell
├─
▾
templates
│ └─
memory-file.md
Markdown
├─
_meta.json
JSON
└─
SKILL.md
Markdown
Security Positives
✓ Sensitive information isolation logic is well-designed (migrate.sh lines 118-146) - attempts to prevent cross-agent credential leakage
✓ Snapshot/rollback mechanism provides safe recovery path
✓ No evidence of reverse shell, C2, or covert data exfiltration channels
✓ Cron job configuration is documented and optional