DingTalk Push

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

The skill is classified as suspicious due to two main vulnerabilities in `send.js`. Firstly, the `DINGTALK_WEBHOOK` is loaded from environment variables or configuration files, meaning if these sources are compromised, the skill could be coerced into sending messages to an arbitrary, attacker-controlled endpoint. While this is a configuration vulnerability rather than direct malicious intent by the skill, it represents a significant risk. Secondly, user-provided `message` and `title` inputs are directly embedded into Markdown without explicit sanitization by the skill, which could allow for Markdown injection (e.g., phishing links, external image loads for tracking) if an attacker controls the input, potentially impacting DingTalk users.