dingtalk-contact
Warn
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill's core strategy involves the agent generating temporary shell scripts in
/tmp/and executing them viabashto handle complex logic and API interactions. This dynamic script generation and execution pattern is a known security risk, as it can lead to arbitrary command execution if user input is interpolated into the scripts without rigorous validation. - [EXTERNAL_DOWNLOADS]: The skill and its utility script (
scripts/dt_helper.sh) perform network operations usingcurlto interact with official DingTalk API endpoints atapi.dingtalk.comandoapi.dingtalk.com. These interactions are used for authentication and data retrieval from well-known service domains. - [PROMPT_INJECTION]: The skill exposes a surface for indirect prompt injection via user-supplied search terms and identifiers.
- Ingestion points: User-provided keywords and user/department IDs are ingested into the
SEARCHandDETAILcommand templates withinSKILL.md. - Boundary markers: There are no explicit boundary markers or instructions to the agent to escape or ignore potentially malicious instructions embedded in the user data.
- Capability inventory: The skill has access to powerful system capabilities, including full shell execution and network access through the provided
scripts/dt_helper.shscript. - Sanitization: The provided shell script logic does not include sanitization or filtering of input variables before they are used in
curlcommands or temporary script generation.
Audit Metadata