md-to-feishu
Fail
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill includes instructions to download and execute an installation script for the
uvtool. - Evidence:
curl -LsSf https://astral.sh/uv/install.sh | shinSKILL.md. - Context: The script is hosted on
astral.sh, the official domain for the well-knownuvPython utility.- [EXTERNAL_DOWNLOADS]: The skill interacts with themermaid.inkAPI to fetch image renders of diagrams. - Evidence: Step 3c describes using
urllib.requestto fetch data fromhttps://mermaid.ink/img/.- [COMMAND_EXECUTION]: The skill executes system commands such aswhich,python3, anduvxto manage the environment and run the conversion tool. - Evidence: Bash blocks in Step 2 and Step 4.- [DATA_EXFILTRATION]: The skill reads local Markdown files and transmits their contents to the Feishu platform.
- Evidence: The primary functionality involves reading a
<MARKDOWN_FILE_PATH>and usingfeishu-docxto create a document.- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it parses user-provided Markdown files to determine the document title and render diagrams. - Ingestion points: Untrusted Markdown files provided by the user.
- Boundary markers: Absent; the agent reads the file content directly to extract the first heading.
- Capability inventory: File system access and command execution through the
feishu-docxanduvxtools. - Sanitization: No sanitization is applied to the Markdown content before it influences the agent's logic or is sent to external APIs.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
Audit Metadata