feishu-card
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The file
handle_event.jsuseschild_process.execSyncto execute a shell command that includes the variablesuserOpenIdandmenuKeyextracted directly from an external event payload. This pattern allows for arbitrary command injection if the event payload contains shell metacharacters. - [COMMAND_EXECUTION]: The skill documentation in
SKILL.mdwarns about shell escaping issues for newline characters but the implementation inhandle_event.jsfails to sanitize inputs or use safer execution methods likespawnwhich would prevent shell interpretation. - [EXTERNAL_DOWNLOADS]: Communicates with the official Feishu Open API (
open.feishu.cn) to obtain access tokens and send interactive message cards.
Recommendations
- AI detected serious security threats
Audit Metadata