Lark Toolkit

PassAudited by ClawScan on May 10, 2026.

Overview

The skill is an openly documented Lark/Feishu API toolkit, but it can use your Lark app credentials to perform broad workspace read/write actions if you run its examples or helper.

Before installing, make sure you want an agent to have Lark/Feishu API guidance. Use a dedicated low-privilege Lark app, grant only the permissions needed for the task, protect app secrets and tenant tokens, and require explicit confirmation for any action that sends messages, changes members, edits docs/tasks/calendar data, or shares content.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone running the helper or API examples with real credentials may give the agent access to Lark workspace data and actions allowed by that app.

Why it was flagged

The skill needs Lark app credentials and can read them from the OpenClaw config; this is expected for a Lark API toolkit but gives tenant-level access according to the app's granted permissions.

Skill content
Required credentials ... Lark App ID ... Lark App Secret ... reads credentials from ... LARK_APP_ID / LARK_APP_SECRET ... ~/.openclaw/openclaw.json
Recommendation

Use a dedicated Lark app with least-privilege permissions, keep app secrets and tokens out of chat/logs, and rotate credentials if exposed.

What this means

If used carelessly, the agent could send messages, read chat history, alter groups, create/update tasks or calendar events, or change document permissions.

Why it was flagged

The documented scope includes broad read/write operations through MCP tools and direct curl APIs; this is purpose-aligned but can affect business data.

Skill content
Covers all Lark operations ... managing groups or members ... creating calendar events ... docs/bitable/wiki/OKR/tasks ... any Lark Open API operation
Recommendation

Ask the agent to confirm before any write, share, delete, member-management, or bulk operation, and prefer read-only permissions when possible.

What this means

Running or sourcing the helper will send the app ID and secret to Lark's auth endpoint and print/export the resulting token in the shell session.

Why it was flagged

The included shell helper reads local configuration and makes a Lark auth API request; this is disclosed and user-directed, not automatic.

Skill content
CONFIG="${OPENCLAW_CONFIG:-$HOME/.openclaw/openclaw.json}" ... RESPONSE=$(curl -s https://open.larksuite.com/open-apis/auth/v3/tenant_access_token/internal
Recommendation

Inspect the script before use, run it only in a trusted shell, and avoid exposing the printed tenant token.

What this means

A poorly secured webhook could receive spoofed or unintended messages and route them into the agent workflow.

Why it was flagged

The webhook setup can expose a public event receiver that routes Lark messages to the agent; origin verification depends on correct configuration.

Skill content
Webhook ... Requires public URL (tunnel or cloud server) ... Token verification — Check header.token matches verificationToken (if configured)
Recommendation

Use HTTPS, configure the Lark verification token and encryption key where available, restrict tunnel exposure, and keep requireMention or equivalent access controls enabled.