Back to skill
Skillv1.0.0

Static analysis security

Feishu Evolver Wrapper Local · Deterministic local checks for risky code patterns and metadata mismatches.

Scanner verdict

ReviewApr 30, 2026, 5:15 AM
Summary
Detected: suspicious.dangerous_exec, suspicious.dynamic_code_execution, suspicious.env_credential_access (+1 more)
Reason codes
suspicious.dangerous_execsuspicious.dynamic_code_executionsuspicious.env_credential_accesssuspicious.potential_exfiltration
Engine
v2.4.5

Evidence

criticalexec_cache.js:19
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalindex.js:485
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalissue_tracker.js:64
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticallifecycle.js:98
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalreport.js:131
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalself-repair.js:20
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalskills_monitor.js:65
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalindex.js:1230
Dynamic code execution detected.
suspicious.dynamic_code_execution
criticalexport_history.js:15
Environment variable access combined with network send.
suspicious.env_credential_access
criticalvisualize_dashboard.js:21
Environment variable access combined with network send.
suspicious.env_credential_access
warnexport_history.js:23
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnvisualize_dashboard.js:143
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration