返回顶部
d

data-leak-detector

数据泄露检测工具。Use when user wants to scan skills, files, or folders for potential data leaks, privacy risks, or suspicious behavior. Detects network calls, file access, process spawning, and environment variable access. 数据安全、隐私检测、安全审计。

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
108
下载量
0
收藏
概述
安装方式
版本历史

data-leak-detector

# Data Leak Detector Scan skills, files, and folders for potential data leaks and privacy risks. ## Features - 🔍 **Static Analysis**: Scan SKILL.md for suspicious patterns - 🌐 **Network Detection**: Detect external API calls - 📁 **File Access**: Detect file read/write operations - 🔄 **Process Detection**: Detect subprocess spawning - 🔐 **Env Access**: Detect environment variable access - 📊 **Risk Scoring**: 0-100 risk score with recommendations ## Risk Levels | Level | Color | Meaning | |-------|-------|---------| | 🟢 Low | Green | Safe, no concerns | | 🟡 Medium | Yellow | Review recommended | | 🔴 High | Red | Caution required | ## Detection Patterns ### Network Risks - curl/wget calls - requests/httpx usage - External API endpoints - WebSocket connections ### File Risks - File read/write operations - Directory traversal - Sensitive file access - Temporary file creation ### Process Risks - subprocess calls - os.system usage - Shell command execution - Process spawning ### Environment Risks - Environment variable access - Config file reading - Credential access ## Trigger Conditions - "检查这个skill安全吗" / "Check if this skill is safe" - "扫描数据泄露" / "Scan for data leaks" - "这个skill有没有风险" / "Does this skill have risks" - "data-leak-detector" --- ## Python Code ```python import os import re import json from pathlib import Path class DataLeakDetector: def __init__(self): self.patterns = { 'network': { 'high': [ r'curl\s+', r'wget\s+', r'requests\.(get|post|put|delete)', r'http[s]?://', r'urllib\.request', r'httpx\.', r'websocket', ], 'medium': [ r'fetch\(', r'axios\.', ] }, 'file_access': { 'high': [ r'open\s*\(', r'os\.remove', r'os\.rmdir', r'shutil\.rmtree', ], 'medium': [ r'readFile', r'writeFile', r'os\.path\.exists', r'glob\.', ] }, 'process': { 'high': [ r'subprocess\.', r'os\.system', r'os\.popen', r'exec\(', r'eval\(', ], 'medium': [ r'Popen', r'call\(', ] }, 'env_access': { 'high': [ r'os\.environ', r'os\.getenv', r'\$[A-Z_]+', ], 'medium': [ r'config\[', r'secrets\[', ] } } def scan_file(self, filepath): """Scan a single file for risks""" risks = [] try: with open(filepath, 'r', encoding='utf-8') as f: content = f.read() except: return risks for category, levels in self.patterns.items(): for level, patterns in levels.items(): for pattern in patterns: matches = re.finditer(pattern, content, re.IGNORECASE) for match in matches: line_num = content[:match.start()].count('\n') + 1 risks.append({ 'category': category, 'level': level, 'pattern': pattern, 'line': line_num, 'match': match.group()[:50] }) return risks def scan_skill(self, skill_path): """Scan entire skill for risks""" skill_path = Path(skill_path) all_risks = [] files_scanned = 0 for ext in ['.md', '.py', '.js', '.ts']: for filepath in skill_path.rglob(f'*{ext}'): risks = self.scan_file(str(filepath)) for risk in risks: risk['file'] = str(filepath.relative_to(skill_path)) all_risks.extend(risks) files_scanned += 1 return all_risks, files_scanned def calculate_risk_score(self, risks): """Calculate overall risk score (0-100)""" if not risks: return 0 score = 0 for risk in risks: if risk['level'] == 'high': score += 20 elif risk['level'] == 'medium': score += 10 return min(score, 100) def generate_report(self, skill_path, risks, files_scanned): """Generate risk assessment report""" risk_score = self.calculate_risk_score(risks) if risk_score <= 20: risk_level = "🟢 LOW" recommendation = "Safe to use" elif risk_score <= 50: risk_level = "🟡 MEDIUM" recommendation = "Review before installing" else: risk_level = "🔴 HIGH" recommendation = "Caution required" # Group by category by_category = {} for risk in risks: cat = risk['category'] if cat not in by_category: by_category[cat] = [] by_category[cat].append(risk) report = [] report.append(f"{'='*60}") report.append(f"DATA LEAK DETECTOR - SECURITY REPORT") report.append(f"{'='*60}") report.append(f"") report.append(f"Skill: {os.path.basename(skill_path)}") report.append(f"Files Scanned: {files_scanned}") report.append(f"Total Risks Found: {len(risks)}") report.append(f"") report.append(f"RISK SCORE: {risk_score}/100 ({risk_level})") report.append(f"RECOMMENDATION: {recommendation}") report.append(f"") # Category breakdown report.append(f"{'='*60}") report.append(f"RISK BREAKDOWN") report.append(f"{'='*60}") for category, category_risks in by_category.items(): high = len([r for r in category_risks if r['level'] == 'high']) medium = len([r for r in category_risks if r['level'] == 'medium']) report.append(f"") report.append(f"{category.upper()}:") report.append(f" High: {high} | Medium: {medium}") for risk in category_risks[:3]: # Show top 3 report.append(f" - [{risk['level'].upper()}] {risk['match']} (line {risk['line']})") # Recommendations report.append(f"") report.append(f"{'='*60}") report.append(f"RECOMMENDATIONS") report.append(f"{'='*60}") if 'network' in by_category: report.append(f"- Review network calls: verify destinations") if 'file_access' in by_category: report.append(f"- Review file access: check for sensitive files") if 'process' in by_category: report.append(f"- Review subprocess calls: verify commands") if 'env_access' in by_category: report.append(f"- Review env access: check for credential access") return '\n'.join(report) # Example usage detector = DataLeakDetector() # Scan skill risks, files_scanned = detector.scan_skill('/path/to/skill') report = detector.generate_report('/path/to/skill', risks, files_scanned) print(report) ``` --- ## Usage Examples ``` User: "检查这个skill安全吗" Agent: Scan SKILL.md and generate risk report User: "扫描我的skills有没有数据泄露" Agent: Scan all installed skills User: "这个skill有没有网络访问" Agent: Focus on network risks ``` --- ## Notes - Static analysis only (no runtime monitoring) - Fast scanning (seconds) - No external API calls - Cross-platform compatible

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 data-leak-detector-1775969701 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 data-leak-detector-1775969701 技能

通过命令行安装

skillhub install data-leak-detector-1775969701

下载 Zip 包

⬇ 下载 data-leak-detector v1.0.0

文件大小: 4.07 KB | 发布时间: 2026-4-13 09:58

v1.0.0 最新 2026-4-13 09:58
数据泄露检测工具:静态分析,检测网络/文件/进程/环境变量风险,生成安全报告

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部