content-collector
Fail
Audited by Snyk on Apr 1, 2026
Risk Level: CRITICAL
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes a concrete Feishu app_token and shows embedding app_token/table_id directly in API calls/examples, which encourages the LLM to output secret values verbatim (high exfiltration risk).
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 0.90). The package is high-risk: it is designed to proactively collect user-shared links/screenshots and upload full content into a remote Feishu workspace (includes hard-coded Feishu app/table IDs and a hard-coded parent folder ID, reads local/ENV user access tokens, and auto-uploads backups), and it explicitly instructs use of scraping/evasion (Scrapling "绕过反爬") — all indicating privacy-invasive data exfiltration and potential centralized collection/backdoor usage; no obfuscated code, eval/remote shells, or dynamic code-exec patterns were found.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly fetches and ingests public social-media and web content (e.g., X/Twitter, mp.weixin.qq.com, Reddit and "generic" URLs) via extract_content.py and references/platforms.md routing to web-content-fetcher (Scrapling), defuddle and x-tweet-fetcher, and then feeds the extracted article text into LLM summarization/generate_tags.py and downstream actions (save_to_bitable.py), so untrusted third‑party content can influence model outputs and subsequent tool actions.
HIGH W008: Secret detected in skill content (API keys, tokens, passwords).
- Secret detected (high risk: 1.00). I scanned the full skill prompt for literal, high-entropy values that could grant access to services.
Flagged item:
- The example call in section 4.5 contains app_token="ND8ObCuSya5Dv3sREZYc03Ilngh". This is a high-entropy, alphanumeric literal used as an app token for Feishu bitable and appears to be a real credential (not a placeholder). It directly matches the "secret" definition (literal value that provides access to a service), so it should be treated as a hardcoded secret.
Ignored items and why:
- table_id="tblaHDM5kjtikIl9": This looks like a resource identifier rather than a secret credential. Identifiers alone typically do not grant access without a valid token, so I did not classify it as a secret.
- app_token="..." and other placeholders like "your_app_token", "your_app_token" in config examples and ellipses are documentation placeholders or redacted values — ignored per the rules.
- Other strings in the doc (e.g., example tags, simple example passwords, environment variable names) are low-entropy/documentation placeholders and therefore ignored.
Conclusion: there is one hardcoded secret-like value present (the Feishu app token in the example).
Issues (4)
W007
HIGHInsecure credential handling detected in skill instructions.
E006
CRITICALMalicious code pattern detected in skill scripts.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W008
HIGHSecret detected in skill content (API keys, tokens, passwords).
Audit Metadata