feishu-upload-image
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/upload_image.pyretrieves sensitive Feishu credentials, specificallyapp_idandapp_secret, from the local configuration file located at~/.goclaw/config.json. - [EXTERNAL_DOWNLOADS]: The
upload_from_urlmethod inscripts/upload_image.pyfetches data from arbitrary external URLs using therequestslibrary. This provides an ingestion point for untrusted data into the skill's workflow. - Ingestion points:
upload_from_urlfunction inscripts/upload_image.py. - Boundary markers: None present to distinguish between trusted and untrusted URL content.
- Capability inventory: The script can perform network GET requests to arbitrary URLs and POST requests to Feishu, as well as read local files.
- Sanitization: A file size check (10MB limit) is implemented, but no content-level validation or sanitization is performed on the downloaded data.
- [DATA_EXFILTRATION]: The skill possesses the capability to read any local file (via
upload_from_file) and transmit its content to an external service (open.feishu.cn). This creates a risk of data exfiltration if the agent is directed to upload sensitive files such as credentials or private keys.
Audit Metadata