feishu-connection

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt instructs placing the App Secret into a file via an echo command and shows inline environment assignments (e.g., FEISHU_APP_ID=cli_xxx), which require copying or embedding secret values verbatim into shell commands/outputs, creating an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The bridge (bridge.py) connects to the Feishu cloud via a LarkWsClient/EventDispatcherHandler to receive user-generated Feishu chat messages over a WebSocket long-connection and forwards those messages to the Moltbot agent, so arbitrary third-party/user content from Feishu is ingested and interpreted by the agent.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 08:51 PM