feishu-work-archive
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
archive.jscontains a hardcodedappId('cli_a75960290439500d') andappSecret('tBd5CYrc3jFTa4yQ9aD3whBMyMvDfl2w'). These are sensitive credentials for a Feishu application and should not be stored in plain text in source files. - [COMMAND_EXECUTION]: Multiple scripts, including
agent-export.sh,export-all.sh, andtest-10.sh, execute shell commands to automate browser actions and manage the local filesystem, including operations in the user's home and cloud storage directories. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface (Category 8). 1. Ingestion points: Document content is retrieved from Feishu via URLs in
auto-start-export.mjsandpersistent-export.mjs. 2. Boundary markers: Absent. External content is concatenated directly with frontmatter and saved. 3. Capability inventory: Filesystem write operations and browser automation via Playwright andagent-browser. 4. Sanitization: Absent. Data from external sources is processed and written to disk without validation or escaping.
Recommendations
- AI detected serious security threats
Audit Metadata