mcp-lark

Fail

Audited by Snyk on Mar 4, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt instructs embedding MCP tokens directly into command-line URLs/arguments (e.g., open.larksuite.com/mcp/stream/) and asks the agent to fetch or request those tokens and place them into commands, which requires the LLM to handle and output secret values verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The SKILL.md explicitly instructs the agent to call MCP endpoints on open.larksuite.com (see LARK_MCP_SERVERS and npx mcporter calls) to manage chats, emails and cloud documents—i.e., user-generated, public third-party content that the agent will fetch and interpret as part of its workflow, enabling indirect prompt injection.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill invokes runtime endpoints such as "open.larksuite.com/mcp/stream/" via commands like "npx -y mcporter …" (which fetches and executes the mcporter package from the npm registry) so remote MCP tool schemas and code are fetched at runtime and can directly control agent tooling/instructions or execute code.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 4, 2026, 06:15 AM