send-feishu
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a bundled script
scripts/feishu-sendto manage communication with the Feishu API. It safely usespython3for JSON formatting and cryptographic signing via heredocs, passing data through environment variables to avoid shell injection. - [EXTERNAL_DOWNLOADS]: The script makes network requests to
open.feishu.cn, a well-known service (Lark/Feishu), to obtain authentication tokens and upload messages or files. These operations are essential for the skill's primary purpose and target an official endpoint. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface because it processes untrusted content (messages, titles, and file data) for delivery to an external service.
- Ingestion points: Data enters the process via the
scripts/feishu-sendscript through environment variables populated from the agent's context (e.g.,MESSAGE,TITLE,BODY). - Boundary markers: The instructions do not define clear delimiters or warnings to prevent the agent from following instructions embedded in the data it is sending.
- Capability inventory: The skill possesses network access via
curland file system read capabilities for file uploads. - Sanitization: The script correctly utilizes
json.dumpswithin its Python blocks to ensure that all data is properly escaped before being included in API payloads, preventing technical injection into the Feishu platform.
Audit Metadata