飞书文档文件夹摘要生成器
PassAudited by ClawScan on May 10, 2026.
Overview
The skill appears to do what it says—read a Feishu folder and summarize documents—but users should make sure the folder link is scoped because it can process every accessible document under it.
This skill is reasonable for summarizing a Feishu folder, but treat it as a broad document-reading workflow. Before installing or invoking it, verify the Feishu link points only to the intended folder, understand which account permissions will be used, and avoid running it on large or highly confidential spaces unless you want all nested documents summarized.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Running the skill on a broad Feishu folder could read and summarize every accessible document and subfolder below that link.
The skill intentionally chains Feishu folder traversal with document reads, which is expected for folder summarization but can cover many documents if run on a high-level folder.
Recursively traverses the folder structure using feishu_wiki API ... Reads each document's content using feishu_doc API
Use it only with folder URLs you intend to summarize, and consider asking for confirmation or limiting depth/scope for large or sensitive folders.
The skill may access any documents under the supplied folder that the configured Feishu identity is allowed to read.
Reading Feishu documents requires delegated Feishu access or account permissions; this is purpose-aligned, but the artifacts do not describe which credential or permission scope is used.
feishu_doc action="read" doc_token="{obj_token}"Run it with the least-privileged Feishu account or app permissions suitable for the folder, and avoid using it on folders containing unrelated confidential documents.
Users have less external context for publisher reputation or change history.
The skill does not provide a public source or homepage for provenance, although the supplied artifacts themselves do not show risky install behavior.
Source: unknown; Homepage: none
Review the included files before use and prefer verified sources for workflows that access business documents.
