feishu-doc
Warn
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The script
lib/auth.jscontains logic to search for.envfiles in parent directories up to four levels deep (../../../../.env). This traversal pattern could lead to the unauthorized exposure of environment variables from the host system. Additionally,download_file.jsallows writing files from Feishu to an arbitrary local path provided as an argument, which could be used to overwrite sensitive files. - [EXTERNAL_DOWNLOADS]: Multiple files, including
index.jsandcreate.js, depend on local modules situated outside the skill's root directory (../feishu-common/index.jsand../common/env). These dependencies are not included in the skill's source code, making their behavior unverifiable. - [PROMPT_INJECTION]: The skill's primary function is to read content from external Feishu documents. This data is ingested into the agent's context without adequate sanitization or boundary markers to prevent indirect prompt injection.
input_guard.jsonly provides structural sanitization for API compatibility. - [CREDENTIALS_UNSAFE]: The skill stores access tokens in a shared memory file (
../../../memory/feishu_token.json) outside its directory. This shared cache, combined with the broad search for.envfiles, increases the risk of credential leakage between different skills or processes. - [COMMAND_EXECUTION]: The
download_file.jsutility takes a file path as an argument and writes data to it usingfs.createWriteStream. An attacker could potentially use this to overwrite critical configuration or shell profile files if the agent is instructed to download a malicious payload to a sensitive location.
Audit Metadata