feishu-robot-registry
Warn
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill's 'register' functionality encourages the storage of sensitive 'session keys' and 'App IDs' in a Feishu document. Storing authentication tokens in collaborative docx documents can lead to unauthorized access or credential theft if the document permissions are not strictly managed.
- [DATA_EXFILTRATION]: Sensitive robot credentials (session keys) are transmitted to and stored on Feishu's cloud infrastructure as part of the registry functionality.
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection.
- Ingestion points: The
listRobotsfunction inindex.jsretrieves arbitrary content from a Feishu document. - Boundary markers: There are no markers or instructions to isolate the retrieved document content from the agent's context.
- Capability inventory: The skill allows creating and updating documents, and it interfaces with the broader agent environment.
- Sanitization: No validation or escaping is performed on the data fetched from the registry document, allowing potentially malicious instructions to be processed by the agent.
- [COMMAND_EXECUTION]: The skill uses the
commanderlibrary to handle command-line arguments. While no direct shell execution of these arguments was observed, user-supplied strings (like robot names) are interpolated into the content sent to the Feishu API. - [EXTERNAL_DOWNLOADS]: The skill communicates with Feishu's official Open APIs (
open.feishu.cn) to perform search, create, and update operations on documents.
Audit Metadata