add-feishu
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [PROMPT_INJECTION]: The skill introduces an indirect prompt injection surface as it is designed to ingest and process messages from the external Feishu platform.
- Ingestion points: The
handleMessagefunction inadd/src/channels/feishu.tsreceives data via theim.message.receive_v1WebSocket event. - Boundary markers: The implementation does not include specific delimiters or instructions for the agent to ignore potentially malicious instructions embedded in user messages.
- Capability inventory: The system architecture (
modify/src/index.ts) allows the agent to execute code within containers and interact with multiple messaging channels. - Sanitization: While message content is parsed from JSON, the raw text content is passed into the agent's processing pipeline without specific sanitization or filtering.
- [COMMAND_EXECUTION]: The documented setup process requires the execution of system commands for environment configuration and service lifecycle management.
- Evidence:
SKILL.mdincludes instructions for building the project withnpm run buildand restarting background services usinglaunchctlorsystemctl. - [EXTERNAL_DOWNLOADS]: The skill utilizes official external libraries and connects to verified service endpoints.
- Evidence: It installs the
@larksuiteoapi/node-sdkpackage and communicates with the official Feishu API atopen.feishu.cn. - [CREDENTIALS_UNSAFE]: The skill manages sensitive application credentials required for the Feishu integration.
- Evidence: The skill configuration involves setting
FEISHU_APP_IDandFEISHU_APP_SECRETin the.envfile, which are then accessed by the application logic.
Audit Metadata