feishu-task-management-skill

WarnAudited by ClawScan on May 18, 2026.

Overview

The skill matches its Feishu task-management purpose, but it ships with real-looking Feishu credentials, a user token, and synced member data, which should be reviewed before use.

Review and remove the bundled Feishu credentials, user token, and member data before installing. Configure the skill with your own least-privilege Feishu app credentials, use a safe OAuth redirect URI, and only allow task writes or deletion after you understand which Feishu account and workspace the agent will affect.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing or running the skill could let the agent act against a real Feishu tenant or user account, including reading and changing tasks, without the user first supplying their own credentials.

Why it was flagged

The submitted package contains Feishu app credentials and a user OAuth-style token with task read/write scope. Even if the token is expired, the app secret remains account authority, and the registry metadata declares no primary credential or required environment variables.

Skill content
"app_id": "cli_a91f12ae11789bc0", "app_secret": "xQXr0i...", "user_access_token": "eyJhbGciOiJFUzI1Ni...", "user_scope": "auth:user.id:read task:task:read task:task:write"
Recommendation

Do not ship live app secrets or user tokens in the skill. Remove toolkit/config/runtime.json secrets, require users to configure their own credentials, and declare the credential requirements in metadata.

What this means

A user following the setup guide could send an OAuth code through an unsafe redirect endpoint, risking account authorization leakage.

Why it was flagged

The OAuth guide builds authorization URLs using an external example.com redirect URI and instructs users to configure that redirect and paste the full callback URL back into the tool. This can expose OAuth authorization codes to a domain not controlled by the user or skill publisher.

Skill content
DEFAULT_REDIRECT_URI = "https://example.com/feishu/oauth/callback"
Recommendation

Use a user-controlled or localhost redirect URI, clearly document the OAuth callback boundary, and avoid defaults that point to third-party placeholder domains.

What this means

People and internal Feishu identifiers from a real workspace may be exposed to anyone who receives or installs the skill.

Why it was flagged

The skill package includes a populated synced member table with names and Feishu identifiers. A local member cache is purpose-aligned, but publishing pre-synced organizational directory data is not necessary for a reusable skill and creates sensitive-data exposure.

Skill content
"member_count": 4, "members": [{ "name": "严浩", "open_id": "ou_3ac4...", "user_id": "G5363" }]
Recommendation

Remove populated member caches from the distributed package, ship only an empty template, and let each user sync their own member directory locally with clear retention and deletion guidance.

What this means

If misused, the agent could send task API payloads outside the documented safe fields.

Why it was flagged

Task create/update/member operations can accept raw JSON payloads, which can bypass the safer dedicated payload builders. The references describe this as an escape hatch for API alignment, so it is disclosed, but it should be used only with explicit user intent.

Skill content
payload = json.loads(raw_body) if raw_body else build_update_payload(...)
Recommendation

Keep routine operations on dedicated commands, require explicit user approval for raw-body use, and avoid using raw payloads for ordinary task changes.