Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

feishu paper manager

v1.0.0

Design or implement a paper-management workflow built on a Feishu bot plus OpenClaw. Use when the user wants to ingest papers from Feishu messages, save PDFs...

0· 149·0 current·0 all-time
byXi Wu@ch1hyaanon
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description and the SKILL.md consistently describe a Feishu + OpenClaw paper ingestion workflow (webhooks, PDF upload, cloud-docs, Feishu tables, taxonomy reviews). That purpose reasonably requires Feishu API access, Drive/table writes, and network calls to an OpenClaw backend. However, the skill's declared metadata lists no required environment variables or primary credential despite instructing actions that require Feishu credentials and upload permissions. This mismatch is notable (the skill is a design/spec rather than an implementation), so expect additional credentials and permissions will be required at implementation time.
Instruction Scope
The SKILL.md stays within the described purpose: it details ingestion rules, deduplication, storage model, table schema, tagging/taxonomy policies, and an explicit API contract between a Feishu bot and OpenClaw. It does not instruct the agent to read unrelated local files, harvest unrelated credentials, or exfiltrate data to unknown third parties. Responsibilities are sensibly split (bot vs OpenClaw).
Install Mechanism
This is an instruction-only skill with no install spec and no code files to execute. That minimizes installation risk (nothing is downloaded or written by the registry package itself).
!
Credentials
Although the workflow requires Feishu Drive and Table operations (which in practice need API credentials/scopes), the skill declares no required environment variables or primary credential. The absence of declared credentials is inconsistent with the documented actions and could lead to implementers adding broad-scoped tokens later without explicit guidance. Also the SKILL.md recommends storing synonym mappings 'in code or configuration' which implies persistent config storage but gives no guidance on secret handling or least privilege for tokens.
Persistence & Privilege
The skill is not marked always:true and is user-invocable only. It does not request persistent system privileges or modifications to other skills. Autonomous invocation is allowed by default but not combined with other high-risk signals here.
What to consider before installing
This skill is primarily a design/spec for a Feishu + OpenClaw paper ingestion system and looks coherent for that purpose, but it omits operational details you should confirm before implementing or deploying: - Expect to need Feishu API credentials (bot/webhook verification, Drive upload, table write). Verify which OAuth scopes or API tokens are required and apply least privilege (only allow Drive/table writes for the specific folder/table). - The registry package declares no required env vars or credentials; that does not mean the feature will work without credentials. Ask the author or your implementer what secrets will be required and where they will be stored. - Confirm where PDFs are stored (cloud-docs folder): check retention, access control, and data residency policies. Sensitive PDFs could expose private data. - Review webhook verification and idempotency implementations carefully (the document recommends them — make sure they are implemented to avoid replay attacks or duplicate uploads). - For automated taxonomy review runs, check who can trigger or approve changes and that backfills are audited (avoid accidental mass relabeling). - When implementing, prefer explicit environment variable names and scope (e.g., FEISHU_CLIENT_ID, FEISHU_CLIENT_SECRET, FEISHU_BOT_TOKEN) and store them securely (secrets manager). Avoid embedding tokens in code or public config. - Because this skill is a blueprint (no code), perform a code review of any concrete implementation for unexpected network endpoints, aggressive permission requests, or missing error handling before granting access tokens. If you proceed, require the implementer to document the exact permissions needed and justify each one; that transparency will reduce risk.

Like a lobster shell, security has layers — review code before you run it.

latestvk975rvmgy9sk4xc4ggk4j7vnfh830ndh

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments