feishu-automation
Fail
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
feishu_api.pycontains hardcodedapp_idandapp_secretcredentials for two distinct Feishu tenants. The 'personal' tenant exposes the IDcli_a83467f9ecba5013and secretbX21pNOyAXHwFXWf0SVGphWQrqrgC5Gd, while the 'hanxing' tenant exposescli_a9f758c0efa2dcc4and5djHWjk8t6QHRquDJXG9JiNEgPynmnIN. - [EXTERNAL_DOWNLOADS]: The configuration script
feishu-mcp-setup.jsexecutes thenpxcommand to dynamically download and run the@larksuiteoapi/lark-mcppackage from the public npm registry. - [COMMAND_EXECUTION]: The skill utilizes several shell and Python scripts (
feishu-mcp-setup.sh,feishu-send.sh,scripts/md2feishu.sh) to execute system-level commands, including interacting with the Feishu API viacurland modifying the user's local.claude.jsonconfiguration file in the home directory.
Recommendations
- AI detected serious security threats
Audit Metadata