Scan Report
45 /100
bitable_to_feishu_webhook
从飞书多维表中按用户规则筛选记录,自动将格式化后的内容推送到指定的群机器人 Webhook
Skill has undeclared network exfiltration capability through user-controlled webhook_url that can send data to any external endpoint, and uses eval() with potential code execution vectors not declared in permissions.
Use with caution
1) Declare all allowed webhook domains in SKILL.md permissions. 2) Consider whitelisting webhook destinations to feishu.cn domains only. 3) Remove or document scripts/push.py. 4) Consider replacing eval() with a safer expression parser.
Attack Chain 3 steps
⬡
Escalation Attacker provides malicious webhook_url pointing to controlled server
SKILL.md inputs:17⬡
Escalation User configures skill with attacker-provided webhook
SKILL.md inputs:17⬡
Escalation Skill POSTs bitable record data (including sensitive fields) to attacker-controlled URL
scripts/push_skill.py:175Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Data exfiltration via undeclared webhook URL | scripts/push_skill.py:175 |
| Medium | eval() with potential code execution escape | scripts/push_skill.py:103 |
| Low | Undocumented secondary script | scripts/push.py:1 |
| Info | Credentials handling appears safe | scripts/push_skill.py:68 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ (https://open.feishu.cn only) | WRITE (arbitrary URL via webhook_url) | ✗ Violation | scripts/push_skill.py:175-183 - send_to_webhook() POSTs to user-provided webhook… |
| Filesystem | NONE | NONE | — | No file system operations found |
| Shell | NONE | NONE | — | No shell execution found |
| Environment | NONE | READ (INPUT_* vars) | ✓ Aligned | Uses os.getenv() to read INPUT_* environment variables - expected but undocument… |
4 findings
Medium External URL 外部 URL
https://open.feishu.cn/open-apis/bot/v2/hook/xxx) SKILL.md:36 Medium External URL 外部 URL
https://open.feishu.cn SKILL.md:66 Medium External URL 外部 URL
https://open.feishu.cn/open-apis/auth/v3/tenant_access_token/internal push_skill.py:59 Medium External URL 外部 URL
https://open.feishu.cn/open-apis/bitable/v1/apps/ push_skill.py:71 File Tree
6 files · 26.2 KB · 805 lines Python 2f · 672L
Markdown 2f · 125L
JSON 1f · 5L
Text 1f · 3L
├─
▾
scripts
│ └─
push.py
Python
├─
_meta.json
JSON
├─
push_skill.py
Python
├─
README.md
Markdown
├─
requirements.txt
Text
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
requests | >=2.25.0 | pip | No | Version pinned at lower bound only |
urllib3 | >=1.26.0 | pip | No | Version pinned at lower bound only |
Security Positives
✓ No shell execution (subprocess, os.system, etc.)
✓ No file system write operations
✓ No credential harvesting from sensitive paths
✓ No base64 decoding or obfuscated code execution
✓ No hidden HTML/JS payloads
✓ No clipboard access
✓ Credentials (app_id, app_secret) are used only for intended Feishu API auth and not exfiltrated
✓ HTTP requests are limited to defined Feishu API endpoints except for the user-controlled webhook_url