wecom-meeting-query
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill exposes sensitive credentials and personally identifiable information (PII) retrieved from the Enterprise WeChat API to the agent's context.\n
- Evidence: The
get_meeting_infocommand returns highly sensitive fields includingpassword(meeting password),host_key(host secret key), andphone_number(guest mobile numbers) in theguestsarray.\n - Context: While necessary for the skill's purpose, the direct exposure of host keys and passwords to the LLM context without explicit masking or access control increases the risk of accidental or malicious disclosure of credentials.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by ingesting untrusted content from the meeting platform.\n
- Ingestion points: Untrusted data enters the agent context through meeting titles (
title) and descriptions (description) fetched via theget_meeting_infotool inSKILL.md.\n - Boundary markers: Absent. The instructions do not define delimiters or provide specific warnings to the agent to disregard instructions embedded within meeting metadata.\n
- Capability inventory: The agent can use the
wecom_mcptool to perform further actions, which could be influenced by malicious instructions in a meeting description.\n - Sanitization: Absent. There is no evidence of filtering or validation for the content of meeting details before it is processed by the agent.
Audit Metadata