Auto Push System Skill

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill matches its Feishu automation purpose, but it can automatically send local file contents named in logs to a preset Feishu chat and rename those files without clear safeguards.

Review carefully before installing. Only use it after setting your own Feishu chat ID, restricting allowed content directories, disabling or reviewing cron jobs, and confirming every external push destination. Do not use it for sensitive documents until the path validation, redaction, and credential declarations are fixed.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A crafted or mistaken log entry could make the skill push an unintended local file to Feishu.

Why it was flagged

The monitor trusts CONTENT_READY lines in log files to select a path and invoke the push script; the visible code does not enforce the documented CONTENT_PATHS allowlist.

Skill content
while IFS= read -r line; do ... if echo "$line" | grep -q "$CONTENT_SIGNAL" ... "$(dirname "${BASH_SOURCE[0]}")/push-content.sh" "$path" "$title"
Recommendation

Validate paths against a strict allowlist, require confirmation for new sources, and reject absolute/private paths before invoking the push command.

What this means

Your Feishu-authorized account could post content to an unintended chat if the default is not changed.

Why it was flagged

The generated configuration defaults to a specific Feishu chat while the skill uses the user's OpenClaw/Feishu authorization; registry metadata declares no primary credential or required env vars.

Skill content
TARGET_CHAT_ID="oc_c133e85bd6eb593e08dcf7aed3a8530b"
Recommendation

Require the user to set TARGET_CHAT_ID during setup, declare the Feishu/OpenClaw credential requirement in metadata, and fail closed if the destination is still a placeholder/default.

What this means

Sensitive local content could be disclosed into a Feishu chat as part of an automatic notification.

Why it was flagged

The script reads up to 1000 lines from a local file and sends it through the OpenClaw Feishu channel, but the artifacts do not define clear data boundaries, redaction, or approval controls.

Skill content
content=$(head -1000 "$CONTENT_PATH" ...); openclaw message send --channel feishu --target "$TARGET_CHAT_ID" --message "$message"
Recommendation

Add redaction and size/type checks, show the destination and preview before sending, and limit uploads to user-selected content directories.

What this means

A wrong path could cause an important file to be renamed after being sent.

Why it was flagged

After a log-triggered push, the script renames the source file, so a bad trigger can propagate from logs into both external posting and local file mutation.

Skill content
mv "$CONTENT_PATH" "${CONTENT_PATH}.processed" 2>/dev/null || true
Recommendation

Do not mutate source files by default; use a separate processed-state database and only move files inside a dedicated staging directory.

What this means

Once scheduled, the workflow may keep posting without you manually starting each push.

Why it was flagged

Recurring background monitoring is disclosed and aligned with the skill's purpose, but it is persistent automation that can post externally.

Skill content
系统自动执行:- 每5分钟扫描日志文件 - 检测`CONTENT_READY`信号 - 创建飞书文档 - 发送通知
Recommendation

Make cron setup explicitly opt-in, document how to disable it, and review schedules before enabling automation.

What this means

Setup may fail or leave the default configuration in place, including the preset Feishu chat destination.

Why it was flagged

The README instructs users to run configure.sh, but the provided manifest only includes install.sh and package-skill.sh under scripts, indicating an incomplete or mismatched package.

Skill content
bash scripts/configure.sh
Recommendation

Provide all referenced helper scripts, align metadata with actual requirements, and avoid publishing incomplete packaging references.

What this means

Users may over-trust the workflow for sensitive content based on unsupported security and compliance claims.

Why it was flagged

The visible implementation is bash scripts that read files, log events, and send Feishu messages; the included artifacts do not show the claimed encryption, compliance, or RBAC controls.

Skill content
End-to-end encryption ... GDPR/CCPA compliance ready ... Role-based access control
Recommendation

Remove or substantiate these claims, and document the actual privacy model, log contents, credential handling, and data destinations.