feishu-automation

Warn

Audited by Socket on Mar 27, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
server/main.py

Best report: Report 1. It correctly identifies the highest-impact issue—an unrestricted, caller-controlled proxy endpoint protected only by a shared header secret—along with token.json persistence and missing OAuth state validation. No clear malicious/obfuscated payload behavior is evident; this appears to be legitimate Feishu integration code. However, from a security standpoint, the proxy design substantially increases impact if PROXY_SECRET is compromised and the lack of state validation and path/method allowlisting are notable hardening gaps. Recommended improvements: (1) enforce strict allowlists for req.path/req.method, (2) validate callback state (store/compare state), (3) harden token.json (permissions, encryption/secret manager, avoid shipping token artifacts), (4) minimize error detail returned to clients, (5) add rate limiting/audit logging for the proxy endpoints.

Confidence: 67%Severity: 63%
AnomalyLOW
scripts/common/oauth_server.sh

Best-fit assessment: This snippet is a functional OAuth helper rather than an obvious malicious payload. However, it introduces significant security/operational risks: it persists high-value refresh tokens into plaintext `../../.env`, prints partial tokens to stdout, and does not validate OAuth `state` on the callback. Additionally, it binds the local callback server to all network interfaces (`''`), increasing exposure if the port is reachable. These issues warrant hardening (restrict binding to localhost, validate `state`, and avoid plaintext refresh token persistence or protect it with strict permissions/encryption).

Confidence: 72%Severity: 67%
Audit Metadata
Analyzed At
Mar 27, 2026, 11:11 AM
Package URL
pkg:socket/skills-sh/fingertap%2Ffeishu-skills%2Ffeishu-automation%2F@1824b3e85dd785e419935877655bff89575e409b