Feishu Audio Message

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill appears to do what it claims—send TTS audio messages to Feishu—but it uses existing Feishu app credentials and local helper tools, so users should verify permissions and recipients.

Before installing, make sure you are comfortable letting this skill use your configured Feishu app credentials to upload audio and send messages. Verify chat IDs and message content, avoid sending sensitive audio unless appropriate for the Feishu workspace, and ensure the local TTS helper and command-line tools are trusted.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill can act through the configured Feishu app and post audio messages to chats the app is allowed to reach.

Why it was flagged

The script reads Feishu app credentials from environment variables or the local OpenClaw configuration to obtain a tenant access token. This is expected for sending Feishu messages, but it is sensitive account authority.

Skill content
CONFIG_FILE="/root/.openclaw/openclaw.json" ... d['channels']['feishu']['accounts']['main']['appSecret']
Recommendation

Install only if you trust the skill with your Feishu bot/app permissions, and verify the target chat ID before sending.

What this means

A mistaken text, file, or chat ID could send an unintended audio message to a Feishu chat.

Why it was flagged

The script uses raw Feishu API calls to upload and send an audio message. This matches the stated purpose, but it is still a message-sending action in an external workspace.

Skill content
curl -sf -X POST "https://open.feishu.cn/open-apis/im/v1/messages?receive_id_type=chat_id" ... "msg_type": "audio"
Recommendation

Use it for deliberate send requests, and double-check message content and recipient IDs.

What this means

The skill may fail or behave differently if the local TTS helper is missing or replaced by an untrusted binary.

Why it was flagged

The script depends on a pre-existing local TTS helper, plus curl and python3, while the registry lists no required binaries or install spec. This is not malicious by itself, but it is an undeclared dependency/provenance consideration.

Skill content
TTS_BIN="/app/openclaw/node_modules/.bin/node-edge-tts" ... "$TTS_BIN" -t "$TEXT" -f "$TMP_FILE"
Recommendation

Confirm that the OpenClaw environment provides trusted versions of node-edge-tts, curl, and python3.