Dingtalk Api
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill bundle is classified as suspicious due to critical vulnerabilities found within the `dingtalk_stream` SDK, specifically in `venv/dingtalk_venv/lib/python3.12/site-packages/dingtalk_stream/chatbot.py` and `card_replier.py`. The `reply_rpa_plugin_card` method in `chatbot.py` is vulnerable to client-side script injection (XSS) as it directly embeds unsanitized `plugin_name` and `ability_name` into a JavaScript string executed by the DingTalk client. Additionally, the `create_and_deliver_card` methods in `card_replier.py` accept arbitrary `**kwargs` that are merged into the API request body, potentially allowing unauthorized API parameter injection. While the skill bundle itself does not exhibit clear malicious intent, these vulnerabilities present significant attack vectors if an adversary can control the inputs to these functions.
