Dingtalk Docs 0.3.1
Analysis
This skill is a coherent DingTalk Docs integration, but users should notice that it uses a token-bearing DingTalk MCP URL and can read, create, and overwrite cloud documents when directed.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"写入前必须确认 updateType" -- "0=覆盖(清空后写入),1=续写(追加到末尾)"
The skill can write to cloud documents, including an overwrite mode that clears existing content, but it explicitly requires confirmation of the update mode.
"peerDependencies": { "mcporter": ">=0.7.0" }, "requiresBinaries": [ "mcporter" ]The package depends on an external globally installed CLI with a lower-bound version rather than an exact pinned version.
command = ['mcporter', 'call', tool, '--output', 'json'] ... subprocess.run(command, capture_output=True, text=True, timeout=timeout)
The helper scripts execute the local mcporter CLI. This is central to the skill's purpose and uses argument lists rather than shell execution.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
"name": "DINGTALK_MCP_DOCS_URL", "description": "钉钉文档服务的 Streamable HTTP 地址(含访问令牌)"
The skill uses a DingTalk MCP URL that contains an access token, giving it the user's DingTalk Docs authority through the configured service.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
访问 [钉钉 MCP 广场](https://mcp.dingtalk.com) ... mcporter config add dingtalk-docs --url "<你的_URL>"
Document operations are routed through a configured DingTalk MCP endpoint, so document content and metadata can pass through that provider connection.
