扫描报告
15 /100
suitedash
SuiteDash integration skill using the Membrane CLI for managing Organizations, Clients, Projects, Tasks, and other SuiteDash resources.
This is a straightforward SuiteDash integration skill that uses the Membrane CLI for API interaction; all behavior is fully documented with no hidden functionality or suspicious patterns.
可以安装
Approve for use. No security concerns beyond standard practices for CLI-based integrations.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Global npm install without version pinning 供应链 | SKILL.md:56 |
| 低危 | Proxy requests allow arbitrary API calls beyond documented actions 文档欺骗 | SKILL.md:104 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | WRITE | WRITE | ✓ 一致 | SKILL.md documents `npm install -g @membranehq/cli` and `membrane` CLI invocatio… |
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md documents Membrane CLI interacting with SuiteDash API via `membrane req… |
| 文件系统 | NONE | NONE | — | No file reads or writes observed in SKILL.md |
| 环境变量 | NONE | NONE | — | SKILL.md explicitly states 'never ask the user for API keys or tokens' and that … |
| 技能调用 | NONE | NONE | — | No cross-skill invocation observed |
2 项发现
中危 外部 URL 外部 URL
https://getmembrane.com SKILL.md:7 中危 外部 URL 外部 URL
https://suitedash.com/university/ SKILL.md:19 目录结构
1 文件 · 5.0 KB · 169 行 Markdown 1f · 169L
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
@membranehq/cli | not pinned | npm | 否 | Installed globally without version constraint; could resolve to different versions over time |
安全亮点
✓ All behavior is explicitly documented in SKILL.md — no hidden functionality
✓ Credentials are handled server-side by Membrane with no local secrets stored
✓ Skill explicitly instructs never to ask users for API keys or tokens
✓ Uses pre-built actions with auth, pagination, and error handling as the preferred method
✓ OAuth-based authentication (browser flow) — no password harvesting risk
✓ No base64, obfuscation, or anti-analysis patterns present
✓ No attempts to access sensitive local paths (~/.ssh, ~/.aws, .env)
✓ No data exfiltration, C2 communication, or credential theft observed