feishu-wiki-orchestrator
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The orchestrator.py script uses subprocess.run to call internal scripts within the skill's own directory for task orchestration. This is a standard and safe practice for multi-step workflows where script paths are hardcoded.
- [EXTERNAL_DOWNLOADS]: The skill uses the requests library to communicate with the official Feishu Open API (open.feishu.cn) and Playwright to verify document access. These network operations are necessary for the skill's core functions and target trusted service domains.
- [CREDENTIALS_UNSAFE]: The skill manages Feishu API credentials through local .env files. It includes logic to search for these files in standard configuration paths and provides a template, ensuring sensitive data is not hardcoded in the source code.
- [PROMPT_INJECTION]: The md_parser.py and doc_verifier.py scripts implement text cleaning to strip zero-width characters and hidden Unicode markers. This serves as a defensive measure to ensure the integrity of the processed content and prevent hidden formatting tricks.
Audit Metadata