3Kmfi6HP / EDtunnel

Use Cloudflare pages and worker serverless to implement VLESS protocol
MIT License
6.25k stars 6.05k forks source link

慎用,可能会被白嫖、泄漏真实IP并被公开 #85

Open DewiRusso opened 6 months ago

DewiRusso commented 6 months ago

大概看了下代码,有以下风险,看起来是故意的,不知道是钓鱼还是为了牟利,谨慎使用!!

  1. 收集当前配置信息,用于白嫖或分发进行收费牟利
  2. 会请求政府网站,泄漏真实 IP
  3. 包含 VLESS 相关信息,会被各类爬虫和搜索引擎扫描收录

https://github.com/3Kmfi6HP/EDtunnel/blob/341cb6af7b53769d6eb5cdbe958ce7ab0cc30793/_worker.js#L75

const bestiplink = `https://sub.xf.free.hr/auto?host=${request.headers.get('Host')}&uuid=${userID_Path}`

https://github.com/3Kmfi6HP/EDtunnel/blob/341cb6af7b53769d6eb5cdbe958ce7ab0cc30793/_worker.js#L89

const hostnames = ['www.fmprc.gov.cn', 'www.xuexi.cn', 'www.gov.cn', 'mail.gov.cn', 'www.mofcom.gov.cn', 'www.gfbzb.gov.cn', 'www.miit.gov.cn', 'www.12377.cn'];
url.hostname = hostnames[Math.floor(Math.random() * hostnames.length)];
url.protocol = 'https:';

newHeaders.set('cf-connecting-ip', newHeaders.get('x-forwarded-for') || newHeaders.get('cf-connecting-ip'));
newHeaders.set('x-forwarded-for', newHeaders.get('cf-connecting-ip'));
newHeaders.set('x-real-ip', newHeaders.get('cf-connecting-ip'));
newHeaders.set('referer', 'https://www.google.com/q=edtunnel');

https://github.com/3Kmfi6HP/EDtunnel/blob/341cb6af7b53769d6eb5cdbe958ce7ab0cc30793/_worker.js#L728

const clash_link = `https://subconverter.do.xn--b6gac.eu.org/sub?target=clash&url=https://${hostName}/sub/${userIDArray[0]}?format=clash&insert=false&emoji=true&list=false&tfo=false&scv=true&fdn=false&sort=false&new_name=true`;
header.push(`\n<p align="center"><img src="https://cloudflare-ipfs.com/ipfs/bafybeigd6i5aavwpr6wvnwuyayklq3omonggta4x2q7kpmgafj357nkcky" alt="图片描述" style="margin-bottom: -50px;">`);
header.push(`\n<b style=" font-size: 15px;" >Welcome! This function generates configuration for VLESS protocol. If you found this useful, please check our GitHub project for more:</b>\n`);
header.push(`<b style=" font-size: 15px;" >欢迎!这是生成 VLESS 协议的配置。如果您发现这个项目很好用,请查看我们的 GitHub 项目给我一个star:</b>\n`);
header.push(`\n<a href="https://github.com/3Kmfi6HP/EDtunnel" target="_blank">EDtunnel - https://github.com/3Kmfi6HP/EDtunnel</a>\n`);
header.push(`\n<iframe src="https://ghbtns.com/github-btn.html?user=USERNAME&repo=REPOSITORY&type=star&count=true&size=large" frameborder="0" scrolling="0" width="170" height="30" title="GitHub"></iframe>\n\n`.replace(/USERNAME/g, "3Kmfi6HP").replace(/REPOSITORY/g, "EDtunnel"));
header.push(`<a href="//${hostName}/sub/${userIDArray[0]}" target="_blank">VLESS 节点订阅连接</a>\n<a href="clash://install-config?url=${encodeURIComponent(clash_link)}" target="_blank">Clash 节点订阅连接</a>\n<a href="${clash_link}" target="_blank">Clash 节点订阅连接2</a></p>\n`);
header.push(``);

https://github.com/3Kmfi6HP/EDtunnel/blob/341cb6af7b53769d6eb5cdbe958ce7ab0cc30793/_worker.js#L751

<meta name="description" content="This is a tool for generating VLESS protocol configurations. Give us a star on GitHub https://github.com/3Kmfi6HP/EDtunnel if you found it useful!">
Become-ILLUSORY commented 6 months ago
  1. 最佳IP
  2. default,直接访问根路径
  3. 指定uuid获取订阅

关于风险,不要请求bestip即可

什么意思?

lifeva commented 6 months ago

你想多了,这些都是实现一些功能用到的。至于未知风险和漏洞,肯定有的,但不是你说的这样子啦

rickhqh commented 6 months ago

神经,政府那个是为了首页跳转,扫描不是让你设置uuid吗,配置信息是为了订阅转换

hunterhe commented 6 months ago

受迫害妄想症烦了?gov是伪装地址,sub类型的是订阅转换

RayWangQvQ commented 4 months ago

鸡场主?妨碍到你赚钱了?

fbigun commented 3 months ago

存在风险

amsd1a1 commented 1 month ago

建议用cloudflare worker vless 原作者项目 https://github.com/zizifn/edgetunnel