Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Feishu All In One
v1.0.0飞书 All-in-One 技能包 - 开箱即用的飞书消息收发解决方案。 集成:文字消息、图片/文件发送、语音转文字、互动卡片、主动消息。 经过完整验证,所有功能均可直接使用。
⭐ 0· 326·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The code and scripts implement Feishu messaging, file upload, interactive cards, callback handling and voice-to-text as documented — required binaries (python3, node) and the use of Feishu App ID/Secret are appropriate. However the registry metadata omitted the FEISHU_APP_ID/FEISHU_APP_SECRET declarations present in SKILL.md (incoherence between metadata and runtime instructions).
Instruction Scope
SKILL.md and scripts instruct the agent to read ~/.openclaw/openclaw.json, resolve agent/account bindings, call Feishu APIs, and start a callback server that can optionally POST card callback data to an OpenClaw Gateway URL. This behavior is documented in SKILL.md (the Gateway callbacks are optional) but the skill will access local OpenClaw config and current working directory context — confirm you are comfortable with that and that the Gateway you configure is trusted.
Install Mechanism
This is an instruction-only skill with included scripts; installation uses typical npm and pip installs (npm install and pip install faster-whisper). No downloads from untrusted one-off URLs or extract operations were observed in the manifest.
Credentials
SKILL.md requires FEISHU_APP_ID and FEISHU_APP_SECRET, but the registry metadata listed no required env vars — mismatch. The scripts also read OPENCLAW_GATEWAY_URL and OPENCLAW_GATEWAY_TOKEN (and fall back to config.gateway.* in ~/.openclaw/openclaw.json) but those gateway env vars are not declared in SKILL.md. The skill reads ~/.openclaw/openclaw.json (which may contain other workspace bindings and account info); ensure that file does not contain unrelated secrets you don't want the skill to read or forward.
Persistence & Privilege
The skill does not request always:true and does not write to other skills' configs. It only reads the user OpenClaw config and runs user-started servers/scripts; no elevated persistent privileges were requested.
What to consider before installing
This skill appears to implement the Feishu features it claims, but check these before installing:
- Metadata mismatch: SKILL.md requires FEISHU_APP_ID and FEISHU_APP_SECRET (and shows exporting them), but the registry metadata did not list required env vars — treat SKILL.md as the authoritative runtime requirement.
- The scripts read your ~/.openclaw/openclaw.json and current working directory to resolve agent/account bindings. Review that file for any secrets or tokens you don't want the skill to access.
- The callback server can POST card callback events to an OpenClaw Gateway URL (OPENCLAW_GATEWAY_URL / OPENCLAW_GATEWAY_TOKEN or config.gateway.*). If you set a gateway token/URL, callback data (card actions) will be forwarded there — only configure this to a gateway you control/trust.
- The skill uses network calls to Feishu APIs and (optionally) to the configured Gateway. If you need to audit behavior, run the scripts in an isolated environment and inspect package.json / package-lock.json to verify dependencies.
- Faster-whisper installation and transcription can download model artifacts and use significant resources; install that component only if you need voice-to-text.
If you accept these behaviors and trust your OpenClaw gateway/config, the skill is coherent with its purpose. If you are unsure about exposing contents of ~/.openclaw/openclaw.json or forwarding callbacks to a remote gateway, do not enable the callback/Gateway integration until you verify the configuration.scripts/card-callback-original.js:29
Environment variable access combined with network send.
scripts/card-callback-server.js:29
Environment variable access combined with network send.
scripts/card-callback-original.js:13
File read combined with network send (possible exfiltration).
scripts/card-callback-server.js:13
File read combined with network send (possible exfiltration).
scripts/send-card.js:12
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk976p27xe3qrbfg097r5299gxh82tgpf
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📱 Clawdis
Binspython3, node
Config~/.openclaw/openclaw.json
