vipshop-skills

Warn

Audited by Gen Agent Trust Hub on Apr 25, 2026

Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [CREDENTIALS_UNSAFE]: Multiple scripts including search.py, detail.py, and img_search.py contain a hardcoded static api_key (dafe77e7486f46eca2e17a256d3ce6b5). Additionally, the exchange_link_builder.py utility found in several sub-skills includes a hardcoded secret key (5fb86e55b72bfc50f083049130e5e76a75c2cbda6bbd6e51d59668057f5c1715) used for HMAC-MD5 signing of product links.
  • [COMMAND_EXECUTION]: The qr_code_client.py script in the login sub-skill uses subprocess.run to execute host system commands like 'open', 'xdg-open', or 'startfile' to display QR code images to the user. While functionally necessary for this specific use case, it represents a dynamic execution pattern.
  • [EXTERNAL_DOWNLOADS]: Documentation and instruction blocks in README.md and SKILL.md direct the AI agent to automatically execute 'clawhub install' for various sub-skills. This pattern instructs the agent to download and install external code at runtime.
  • [DATA_EXFILTRATION]: The skill suite manages sensitive user session cookies (PASSPORT_ACCESS_TOKEN) and stores them in a local JSON file (~/.vipshop-user-login/tokens.json). While these tokens are transmitted to official vendor domains, the local storage and programmatic handling of session credentials create an expanded attack surface for potential data exposure.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 25, 2026, 12:43 PM