Back to skill
Skillv1.0.0
Static analysis security
Feishu Evolver Wrapper Local · Deterministic local checks for risky code patterns and metadata mismatches.
Scanner verdict
ReviewApr 30, 2026, 5:15 AM
- Summary
- Detected: suspicious.dangerous_exec, suspicious.dynamic_code_execution, suspicious.env_credential_access (+1 more)
- Reason codes
- suspicious.dangerous_execsuspicious.dynamic_code_executionsuspicious.env_credential_accesssuspicious.potential_exfiltration
- Engine
- v2.4.5
Evidence
criticalexec_cache.js:19
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalindex.js:485
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalissue_tracker.js:64
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticallifecycle.js:98
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalreport.js:131
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalself-repair.js:20
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalskills_monitor.js:65
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalindex.js:1230
Dynamic code execution detected.
suspicious.dynamic_code_execution
criticalexport_history.js:15
Environment variable access combined with network send.
suspicious.env_credential_access
criticalvisualize_dashboard.js:21
Environment variable access combined with network send.
suspicious.env_credential_access
warnexport_history.js:23
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnvisualize_dashboard.js:143
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
