feishu-card
Warn
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
send_safe.jsis vulnerable to shell command injection. It constructs a command string by interpolatingoptions.target,options.color, andoptions.titledirectly into a template string passed toexecSync. While the variables are wrapped in double quotes, they are not sanitized, allowing an attacker to escape the quotes (e.g., using"; id; ") and execute arbitrary shell commands. - [COMMAND_EXECUTION]: The
handle_event.jsscript exhibits a similar command injection vulnerability. It extracts data from an external event payload (userOpenIdandmenuKey) and interpolates it into anexecSynccall. This creates a direct path for executing arbitrary code if the event source is untrusted or compromised. - [PROMPT_INJECTION]: This category identifies an indirect injection surface in the skill's event handling logic.
- Ingestion points: The
handle(eventPayload)function inhandle_event.jsprocesses external JSON data. - Boundary markers: Absent. The data is directly interpolated into a command string.
- Capability inventory: The skill has the capability to execute shell commands via
child_process.execSyncin bothhandle_event.jsandsend_safe.js. - Sanitization: None. The scripts rely on simple double-quoting which is insufficient to prevent command injection attacks.
Audit Metadata