企业股权穿透

AdvisoryAudited by Static analysis on May 8, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

API requests made by the skill are authenticated as the user's Qixin account and may consume quota or reveal queried company names to the provider.

Why it was flagged

The client uses the user's Qixin API token as an authentication header for the API provider; this is expected for the service, but the token represents account and quota authority.

Skill content
constructor(apiToken: string, baseURL: string = 'https://external-api.qixin.com/skill/ent/public') { ... 'x-api-token': apiToken
Recommendation

Use a token intended for this service, keep it out of prompts and logs, do not override the base URL unless it is trusted, and rotate the token if it may have been exposed.

What this means

Anyone or any process that can read the shell profile may be able to obtain the API token.

Why it was flagged

The Mac/Linux setup persists the provider API token in the user's shell profile; this is disclosed and user-directed, but it stores a credential in a local plaintext configuration file.

Skill content
echo 'export QXBENT_API_TOKEN="your_token_here"' >> ~/.zshrc
Recommendation

Set restrictive file permissions, consider using a secret manager or temporary environment variable where practical, and remove the token when no longer needed.

What this means

A compromised or unexpected dependency version could affect the local runtime, although no suspicious dependency behavior is shown in the provided artifacts.

Why it was flagged

The skill installs an npm dependency with a semver range and no lockfile shown; axios is expected for an HTTP API client, but installation depends on npm registry resolution at install time.

Skill content
"dependencies": { "axios": "^1.6.0" }
Recommendation

Install from a trusted registry and network, prefer reviewed lockfiles or pinned versions in high-assurance environments, and keep dependencies updated.