feishu-card-parser
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection because it parses untrusted external data (Feishu card JSON) which could contain malicious instructions embedded in the 'text' or 'lark_md' fields. However, the skill has no dangerous capabilities that could be exploited by such an injection.
- Ingestion points: The
parse_card_messagefunction incard_parser.pyaccepts and processes arbitrary JSON input representing card content. - Boundary markers: The skill does not implement boundary markers or instructions for the LLM to ignore embedded commands in the parsed output.
- Capability inventory: The skill logic is limited to string manipulation and data structure parsing; it does not perform network operations, subprocess execution, or file writing.
- Sanitization: No explicit sanitization or filtering of text content is performed beyond standard Markdown formatting.
- [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile contains a instruction topip install json. Whilejsonis a standard built-in Python library and does not require installation, the PyPI package named 'json' is a non-malicious utility/stub package. This is a documentation error by the author rather than a security risk.
Audit Metadata