jimureport
Audited by Socket on May 14, 2026
2 alerts found:
Anomalyx2该技能整体用途与能力大体一致,主要面向 JimuReport/Jeecg 官方生态,未见明确恶意窃密或隐蔽外传证据,因此不属于确认恶意。但它要求高权限令牌与密码、可保存凭证、可直接执行脚本并对远端系统和本地项目实施修改,属于中高风险自动化技能;综合判定为 SUSPICIOUS。
This module is an automation script for deploying a remote reporting configuration and dataset. It does not exhibit classic malware indicators (no exec/eval, no persistence, no explicit command-and-control). However, it contains high-signal security weaknesses: it disables TLS certificate verification while authenticating/siging API requests with sensitive header material, and it passes untrusted HTML (richText) plus external URLs (image/QR) into report rendering. These factors elevate supply-chain risk substantially, even though malicious intent is not strongly demonstrated by the code itself.