MUKI Asset Fingerprinting
Analysis
This is a coherent authorized-security scanning skill, but it deserves review because it can actively scan targets and collect credentials or personal data, and some credential rules are marked non-sensitive.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Sends protocol-specific probes... Sensitive Path Detection... Automatically extracts high-risk information from responses. Categories: Credentials, Personal Data, Financial
The skill is explicitly designed to send active network probes, check sensitive paths, and extract sensitive response data. This is coherent for authorized penetration testing, but it is high-impact and can be misused outside a defined engagement scope.
Use Tor proxy for anonymity ... Adjust thread count to avoid detection
The documentation includes stealth/anonymity guidance. That can be legitimate in an approved red-team test, but the wording can also encourage unsafe use if the user has not confirmed authorization.
location: https://54.79.99.238:2087/
A raw-IP HTTPS endpoint appears inside the large fingerprint reference database and was flagged by the static scanner. The artifacts do not show it is executed or used as an installer, but it is unexplained and should be verified.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
- name: 密码 ... scope: response body ... sensitive: false - name: 账号 ... scope: response body ... sensitive: false - name: JDBC ... scope: any ... sensitive: false
The rules intentionally detect passwords, accounts, and JDBC connection strings, but mark them as not sensitive. If these rule labels drive report handling or downstream context use, credential-like findings may not receive the protection the SKILL.md recommends.
