Dangerous exec
- Finding
- Shell command execution detected (child_process).
Security checks across static analysis, malware telemetry, and agentic risk
This Feishu connector is purpose-aligned, but it should be used knowingly because it stores bot secrets, changes OpenClaw routing, and restarts the gateway.
Use this skill only if you intend to connect a Feishu bot to OpenClaw. Before running it, confirm the target agent and routing mode, choose restrictive DM/allowlist settings if needed, and remember that the Feishu App Secret will be stored in local OpenClaw config files and the gateway will be restarted.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A Feishu bot secret will be stored locally, and existing OpenClaw secrets may be copied into backup files.
The skill persists Feishu App Secret values into the user's OpenClaw configuration and backs up the existing config, which may also contain secrets.
const CONFIG_PATH = path.join(process.env.HOME, '.openclaw', 'openclaw.json'); ... fs.copyFileSync(CONFIG_PATH, backupPath); ... appSecret: appsecret,
Use this only with trusted agents, keep ~/.openclaw permissions restricted, avoid exposing command-line secrets, and rotate the Feishu secret if it may have been leaked.
Running the skill can change message session behavior and briefly disrupt gateway service.
The shell commands are fixed strings and are aligned with the setup purpose, but they change OpenClaw state and restart the gateway.
execSync('openclaw config set session.dmScope "per-account-channel-peer"', { stdio: 'pipe' }); ... execSync('openclaw gateway restart', { stdio: 'inherit' });Run it only after confirming the intended account, agent, and routing mode, preferably during a time when a gateway restart is acceptable.
If the bot is reachable by many Feishu users, untrusted messages may be routed to the selected agent.
The default configuration allows broad Feishu message access unless the user supplies a more restrictive policy.
dmPolicy: options.dmpolicy || 'open',
allowFrom: ['*'],
enabled: trueConsider using pairing or allowlist DM policies and group-specific bindings when the bot should not accept messages from everyone.
If dependencies are installed, extra third-party code may be fetched even though it is not needed by the visible implementation.
The package declares an external semver-ranged dependency, while the provided code does not require it and there is no lockfile or install spec in the artifacts.
"dependencies": {
"readline": "^1.3.0"
}Prefer removing the unused dependency or pinning and verifying dependencies before installation.