Trust Assessment
feishu_file_fetch received a trust score of 79/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Suspicious import: urllib.request, User-controlled output directory allows arbitrary file writes.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | User-controlled output directory allows arbitrary file writes The `outdir` parameter, which specifies the directory where downloaded files will be saved, is directly controlled by user input (`data.get("outdir", "/root/clawd/uploads")`). While the `_ensure_within_outdir` function correctly prevents path traversal *within* the specified `outdir`, it does not restrict the `outdir` itself. This means a malicious user could specify an `outdir` like `/tmp`, `/var/www/html`, or `/etc/` (if the process has write permissions) and write arbitrary files to these locations. This could lead to denial of service, privilege escalation, or web shell deployment depending on the target directory and the content of the downloaded file. Restrict the `outdir` parameter to a predefined, secure, and isolated directory (e.g., a specific subdirectory within the skill's sandbox or a temporary upload directory managed by the host system). Do not allow arbitrary user-defined paths for `outdir`. If user-defined subdirectories are needed, ensure they are always relative to a fixed, secure base directory that is not user-configurable. | LLM | scripts/feishu_file_fetch.py:190 | |
| MEDIUM | Suspicious import: urllib.request Import of 'urllib.request' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/dingshuxin353/feishu-file-fetch/scripts/feishu_file_fetch.py:11 |
Scan History
Embed Code
[](https://skillshield.io/report/f2022f5c25b66cbf)
Powered by SkillShield