lark-event
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill creates an indirect prompt injection attack surface by consuming data from the Lark event stream, such as incoming messages or calendar updates, which originate from potentially untrusted external users. \n
- Ingestion points: Lark WebSocket event stream accessed via
lark-cli event +subscribeinreferences/lark-event-subscribe.md. \n - Boundary markers: None identified in the provided instructions or examples. \n
- Capability inventory: The skill can write events to the local file system (
--output-dir) and the documentation provides examples of piping this data to other tools likeclaudefor automated replies orlark-cli docsfor updating documents. \n - Sanitization: No validation or sanitization of the event content is performed before processing or outputting the data.
Audit Metadata