feishu-calendar
Warn
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXPOSURE]: The skill accesses sensitive
.envfiles located in parent directories to retrieve API credentials. - Evidence: Scripts including
lib/CalendarManager.js,check.js, andcreate.jsusedotenvto load configurations from../../.envor../../../.envwhich containFEISHU_APP_IDandFEISHU_APP_SECRET. - [PROMPT_INJECTION]: Indirect prompt injection surface exists through the processing of calendar event metadata.
- Ingestion points:
sync.jsandlib/CalendarManager.jsfetch event summaries and descriptions from the Feishu API. - Boundary markers: Absent; no delimiters or warnings are used when writing these strings to
HEARTBEAT.mdorcalendar_events.json. - Capability inventory: The skill executes shell commands via Node.js scripts and has file write permissions.
- Sanitization: Absent; external data is interpolated into project files used by the agent for context without escaping or validation.
- [COMMAND_EXECUTION]: The skill relies on the execution of shell commands with user-influenced arguments.
- Evidence:
SKILL.mddefines protocols for the agent to runnode create.jsand other scripts using parameters extracted directly from user requests.
Audit Metadata