扫描报告
65 /100
huo15-memory-evolution
火一五记忆进化技能 - 四类分类体系记忆系统改造
Critical: hardcoded API key exposed in source code at scripts/dream.sh:79 enables unauthorized API usage if repository is accessed.
不要安装此技能
IMMEDIATE: Remove the hardcoded API key from scripts/dream.sh and use environment variable instead. Rotate the exposed API key immediately.
攻击链 3 步
⬡
提权 Attacker gains read access to repository (public repo, insider threat, or leaked credentials)
N/A⬡
提权 Attacker extracts hardcoded API key from scripts/dream.sh:79
scripts/dream.sh:79◉
影响 Attacker uses extracted API key to make unauthorized calls to MiniMax API at api.minimaxi.com, incurring costs to the victim's account
N/A安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Hardcoded API Key in Source Code 凭证窃取 | scripts/dream.sh:79 |
| 高危 | Undeclared Network Access 文档欺骗 | scripts/dream.sh:89 |
| 中危 | Undeclared Filesystem Write to ~/.openclaw/ 敏感访问 | scripts/install.sh:53 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | WRITE | ✓ 一致 | install.sh, migrate.sh, batch-install.sh write to ~/.openclaw/ without explicit … |
| 网络访问 | NONE | WRITE | ✗ 越权 | dream.sh:89 - curl POST to api.minimaxi.com with API key |
| 环境变量 | NONE | READ | ✓ 一致 | OC_AGENT_ID environment variable read for routing - legitimate behavior document… |
1 高危 5 项发现
高危 API 密钥 疑似硬编码凭证
API_KEY="sk-cp-pD1WY6KcHeUNXDeKmG4ZnzDch-sXsZKmAsNn7rXZDoAbGwc7u6XJn55Z6GbgW3qngTC-i5geM4PzDwkaSj8sQUSk2TPPj-lrLc-Yamjn-... scripts/dream.sh:79 中危 外部 URL 外部 URL
https://api.minimaxi.com/v1/text/chatcompletion_v2 scripts/dream.sh:80 提示 邮箱 邮箱地址
[email protected] scripts/MIGRATION-REPORT-2026-04-04.md:35 提示 邮箱 邮箱地址
[email protected] scripts/MIGRATION-REPORT-2026-04-04.md:38 提示 邮箱 邮箱地址
[email protected] scripts/MIGRATION-REPORT-2026-04-04.md:39 目录结构
16 文件 · 55.6 KB · 2108 行 Shell 8f · 1468L
Markdown 4f · 436L
JSON 2f · 113L
JavaScript 1f · 65L
Text 1f · 26L
├─
▾
config
│ ├─
agent-routing.js
JavaScript
│ └─
memory-types.json
JSON
├─
▾
scripts
│ ├─
▾
snapshots
│ │ └─
snapshot-info-2026-04-04-234219.txt
Text
│ ├─
batch-install.sh
Shell
│ ├─
check-drift.sh
Shell
│ ├─
dream.sh
Shell
│ ├─
INSTALL-REPORT-2026-04-04.md
Markdown
│ ├─
install.sh
Shell
│ ├─
migrate.sh
Shell
│ ├─
MIGRATION-REPORT-2026-04-04.md
Markdown
│ ├─
rollback.sh
Shell
│ ├─
snapshot.sh
Shell
│ └─
verify.sh
Shell
├─
▾
templates
│ └─
memory-file.md
Markdown
├─
_meta.json
JSON
└─
SKILL.md
Markdown
安全亮点
✓ Sensitive information isolation logic is well-designed (migrate.sh lines 118-146) - attempts to prevent cross-agent credential leakage
✓ Snapshot/rollback mechanism provides safe recovery path
✓ No evidence of reverse shell, C2, or covert data exfiltration channels
✓ Cron job configuration is documented and optional