Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Feishu Send Message

v5.0.0

自动从本地配置获取飞书凭证,支持多Agent独立身份向指定open_id或chat_id发送文本消息汇报任务结果。

0· 170·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for pikaqiuyaya/feishu-auto-report.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Feishu Send Message" (pikaqiuyaya/feishu-auto-report) from ClawHub.
Skill page: https://clawhub.ai/pikaqiuyaya/feishu-auto-report
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install feishu-auto-report

ClawHub CLI

Package manager switcher

npx clawhub@latest install feishu-auto-report
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's code and SKILL.md align with the stated purpose: it reads per-agent OpenClaw config (~/.openclaw/openclaw-{agentId}.json) to extract channels.feishu.appId and appSecret and then calls Feishu APIs to send messages. However, registry metadata lists no required binaries/env vars though the script depends on curl and jq; _meta.json version also mismatches SKILL.md version—these are coherence issues.
!
Instruction Scope
Instructions and send.sh direct the agent to automatically scan a home-directory config path and use the appSecret to obtain tenant tokens and send arbitrary message text. That is consistent with a messaging skill, but it also means an agent can send any data (including sensitive local data) out via Feishu if invoked with crafted content. The SKILL.md gives broad, automatic scanning behavior ('zero configuration, automatically scan and use'), which increases the risk surface because credentials are read without an explicit interactive configuration step.
Install Mechanism
No install spec (instruction-only + script), so nothing is written by an installer. The included send.sh will execute network requests. The manifest does not declare dependencies (curl, jq) required at runtime—this omission is an implementation gap but not itself malicious.
Credentials
No environment variables are requested; instead the skill reads a local config file for appId/appSecret. Reading those Feishu credentials is proportionate to the stated goal (sending messages), but the practice of auto-scanning home-directory config files can lead to unexpected credential usage if users have multiple agent configs or store other secrets in the same path.
Persistence & Privilege
always:false and no install-time persistence. The skill does not request elevated platform privileges or attempt to modify other skills or system settings.
What to consider before installing
Before installing: (1) confirm you trust the skill author—this script will read per-agent Feishu appId/appSecret from ~/.openclaw/openclaw-{agent}.json and use them to send messages; (2) be aware agents can send arbitrary message content so the skill could be used to exfiltrate data if an agent is malicious or misconfigured; (3) ensure curl and jq are present or the script will fail (these are not declared as requirements); (4) consider restricting where credentials are stored, or review the contents of the config files and the send.sh script, and require explicit consent before allowing automatic scanning/sending in your environment.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dzyfmfc0k28t8x3yfcg84hs839zf8
170downloads
0stars
4versions
Updated 20h ago
v5.0.0
MIT-0

Feishu Auto-Report Skill - 飞书自主汇报技能


name: Feishu Auto-Report - 飞书自主汇报 description: 专为多 Agent 协作设计。Agent 完成任务后自主调用本技能向用户汇报结果,显示独立机器人身份。零配置,Agent 启动时自动扫描使用,无需手动配置飞书凭证。 descriptionEn: Designed for multi-agent collaboration scenarios. After completing tasks, agents independently call this skill to report results to users with independent robot identity. Zero configuration, agents automatically scan and use it without manual Feishu credential configuration. version: 5.0.0 author: pikaqiuyaya license: MIT tags:

  • feishu
  • auto-report
  • multi-agent
  • notification
  • zh-CN
  • 飞书
  • 自主汇报
  • 多 Agent
  • 零配置 language: zh-CN

Feishu Auto-Report Skill - 飞书自主汇报技能

设计目标

在多 Agent 协作架构中,执行 Agent(Agent-B/C)完成任务后需要向用户汇报结果。本技能提供零配置的消息发送能力,让每个 Agent 以自己的身份独立发送通知,无需 Agent-A 转发。

技术实现

通过飞书开放平台的 Internal App 凭证获取 tenant_access_token,调用飞书消息 API 发送文本消息。支持 open_id(私聊)和 chat_id(群聊)两种接收者类型,确保消息精准触达。

配置依赖

技能自动从以下配置文件读取飞书凭证(无需手动配置):

  • ~/.openclaw/openclaw-{agentId}.json

Agent 启动时会自动扫描该路径下的配置文件,读取 channels.feishu.appIdchannels.feishu.appSecret 字段完成鉴权。

API 调用流程

# 1. 获取租户级访问令牌
POST https://open.feishu.cn/open-apis/auth/v3/tenant_access_token/internal/
Headers: Content-Type: application/json
Body: {"app_id": "xxx", "app_secret": "xxx"}

# 2. 发送文本消息
POST https://open.feishu.cn/open-apis/im/v1/messages?receive_id_type={idType}
Headers: 
  Authorization: Bearer {tenant_access_token}
  Content-Type: application/json
Body: {
  "receive_id": "{targetId}",
  "msg_type": "text",
  "content": "{\"text\":\"{messageContent}\"}"
}

脚本参数

参数说明示例
agentIdAgent 标识agent-b
targetId接收者 IDou_xxx 或 oc_xxx
idTypeID 类型open_id / chat_id
content消息内容任务已完成

与 setup-multi-gateway 配合

  1. Agent-A 接收用户指令
  2. Agent-A 通过 sessions_send 派发任务
  3. Agent-B/C 执行任务
  4. Agent-B/C 自主调用本技能汇报
  5. 用户收到对应 Agent 的通知

注意事项

  • open_id 是应用隔离的,每个 Agent 使用自己的 open_id
  • chat_id 是通用的,跨 Agent 共享
  • content 必须是转义的 JSON 字符串

Comments

Loading comments...