The skill is vulnerable to RAG/memory poisoning
Claims to do
contact (v1): **CRITICAL — 开始前 MUST 先用 Read 工具读取 [`../lark-shared/SKILL.md`](../lark-shared/SKILL.md),其中包含认证、权限处理**
Actually does
The skill acts as an interface to the `lark-cli` command-line tool, specifically its `contact` subcommand. It provides shortcuts to execute `lark-cli contact +search-user` for searching employees and `lark-cli contact +get-user` for retrieving user details. It also allows running `lark-cli contact --help`.
npx skills add https://github.com/larksuite/cli --skill lark-contactThe agent is explicitly instructed to read `../lark-shared/SKILL.md` before execution, with the file described as containing 'authentication, permission handling'. This could be used to poison the agent's RAG/memory with attacker-controlled instructions, manipulate its understanding of permissions, or harvest credentials if the file is compromised. The 'CRITICAL' and 'MUST' are semantic manipulation tactics.
**CRITICAL — 开始前 MUST 先用 Read 工具读取 [`../lark-shared/SKILL.md`](../lark-shared/SKILL.md),其中包含认证、权限处理**
The stated purpose includes 'query organization structure', but the skill's explicit shortcuts only cover searching for individual users and retrieving their information, not directly querying the organizational hierarchy.
Stated purpose: '查询组织架构' (query organization structure). Shortcuts: `+search-user`, `+get-user` (search users, get user info).
[](https://mondoo.com/ai-agent-security/skills/github/larksuite/cli/lark-contact)<a href="https://mondoo.com/ai-agent-security/skills/github/larksuite/cli/lark-contact"><img src="https://mondoo.com/ai-agent-security/api/badge/github/larksuite/cli/lark-contact.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/larksuite/cli/lark-contact.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.