Back to skill
Skillv1.0.0
ClawScan security
Feishu Sheet Reader · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 11, 2026, 8:00 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's stated intent (read Feishu sheets) matches the code's network calls, but it silently reads the agent config file and relies on undeclared credentials/environment variables and has a small mismatch between the SKILL.md instructions and the actual code—these inconsistencies warrant caution.
- Guidance
- This skill appears to do what it says (call Feishu APIs and return sheet data) but has a few inconsistencies you should consider before installing: (1) it requires Feishu app credentials, but the registry lists none — the script looks for them in ~/.openclaw/openclaw.json or the FEISHU_APP_ID / FEISHU_APP_SECRET environment variables; (2) it reads the agent's config file directly, which could expose unrelated credentials stored there; (3) SKILL.md suggests using `openclaw config get` but the code bypasses that and reads the file itself. Recommended steps: inspect ~/.openclaw/openclaw.json to see what it contains; prefer to provide FEISHU_APP_ID and FEISHU_APP_SECRET as environment variables rather than exposing the whole agent config; ask the author to update SKILL.md and the registry metadata to declare required env vars and to either use the documented `openclaw config get` workflow or justify direct config-file access; if you must run it, do so in an account/environment without other sensitive credentials or in a sandbox. If the author confirms the config file only contains scoped Feishu app credentials (and updates the docs), that reduces concern.
Review Dimensions
- Purpose & Capability
- noteThe skill's purpose (calling Feishu APIs to read sheets) aligns with the included script which requests Feishu tenant tokens and sheet data. However the SKILL.md says credentials are obtained via `openclaw config get` while the script directly reads ~/.openclaw/openclaw.json (and falls back to FEISHU_APP_ID/FEISHU_APP_SECRET env vars) — a mismatch in how credentials are retrieved.
- Instruction Scope
- concernSKILL.md describes parsing sheet URLs and calling Feishu APIs (expected). The shipped script performs those actions, but it also directly reads the agent's config file (~/.openclaw/openclaw.json). Reading that file can expose credentials or configuration unrelated to this skill (it looks up the 'channels.feishu.accounts' tree but opens the entire config). The SKILL.md's instruction to use `openclaw config get` is not reflected in the code.
- Install Mechanism
- okInstruction-only with no install spec and no external downloads; the script runs local curl subprocesses. No installer or archive download risk was detected.
- Credentials
- concernRegistry metadata declares no required env vars/credentials, but the script needs Feishu app credentials either from ~/.openclaw/openclaw.json or from FEISHU_APP_ID / FEISHU_APP_SECRET env vars. The skill should explicitly declare these requirements. Reading the agent config file without declaring this expands the data surface (may expose other channel credentials).
- Persistence & Privilege
- concernThe skill does not request always:true and does not modify system configuration, which is good. However it reads the global agent config file (~/.openclaw/openclaw.json) at runtime — this read is a privileged access to potentially sensitive config belonging to the agent and other skills and should be explicitly justified and documented.
