feishu-chat-extractor
Warn
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill accesses sensitive local file paths to retrieve Feishu API credentials. Specifically,
scripts/extract_chat.pyreads~/.openclaw/agents/main/agent/feishu-app-token.txtandscripts/monitor_external_aj.pyreads~/.openclaw/.envto fetchFEISHU_APP_IDandFEISHU_APP_SECRET.- [COMMAND_EXECUTION]: The scriptscripts/monitor_wulao.pyusessubprocess.runto execute other scripts within the skill. While currently using hardcoded arguments, spawning subprocesses is a risky capability that should be monitored.- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface by ingesting untrusted chat data from Feishu (ingestion points:scripts/extract_chat.pyandscripts/monitor_*.py). It lacks boundary markers or sanitization to prevent the agent from obeying instructions embedded in chat messages. When combined with capabilities like file writing inscripts/monitor_with_intimacy.pyand command execution inscripts/monitor_wulao.py, this poses a low-level risk of indirect influence on the agent's behavior.- [COMMAND_EXECUTION]: Multiple scripts usesys.path.insertwith hardcoded absolute user paths (e.g.,/Users/delta/.openclaw/...) to dynamically load local modules. This makes the skill environment-dependent and involves dynamic path manipulation which is an unsafe coding practice.
Audit Metadata