Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

飞书图片发送技能

v1.0.2

使用自有飞书应用配置,上传并发送本地图片到指定飞书用户或群聊,支持PNG/JPG/GIF/WEBP格式。

0· 97·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for icesumer-lgtm/feishu-axiang-send-image.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "飞书图片发送技能" (icesumer-lgtm/feishu-axiang-send-image) from ClawHub.
Skill page: https://clawhub.ai/icesumer-lgtm/feishu-axiang-send-image
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install feishu-axiang-send-image

ClawHub CLI

Package manager switcher

npx clawhub@latest install feishu-axiang-send-image
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description match the code: the script implements the two-step Feishu flow (tenant token → upload image → send message) against open.feishu.cn. No unrelated services, binaries, or credentials are requested by the registry metadata.
Instruction Scope
SKILL.md and README instruct users to edit credentials in scripts/send.py and reference an allow-list file (feishu-axiang-allowFrom.json). The included script performs the token/upload/send flow but does not read or enforce the referenced allowFrom file — documentation and implementation are inconsistent. The instructions also recommend putting credentials into the script (not ideal) rather than environment variables.
Install Mechanism
No install spec; this is instruction-only plus a Python script. No downloads or archive extraction. Risk from install mechanism is low.
Credentials
The registry metadata lists no required env vars, but the script requires Feishu AppID/AppSecret to function (currently present as placeholders in APP_CONFIG). Credentials are expected to be placed directly in the script per README/SKILL.md rather than declared environment variables — this is a security hygiene concern but not an incoherence with the stated purpose.
Persistence & Privilege
The skill does not request always:true, does not modify other skills, and has no system persistence; it runs only when invoked.
Assessment
This skill appears to be what it says: a simple Feishu image sender. Before installing or running it, do the following: (1) Replace the placeholder APP_CONFIG.app_id and app_secret with credentials you control, but avoid embedding secrets in code — prefer environment variables or a protected config file. (2) Note the README mentions an allow-list file, but the script does not enforce it — if you need recipient restrictions, add enforcement or verify targets yourself. (3) Don’t commit the script with real AppID/AppSecret to public repos. (4) Run the script in a trusted environment and grant the Feishu app only the minimum API scopes required. If you want a stricter review, request that the author remove hardcoded credentials and implement the documented allow-list check (or explain why it was omitted).

Like a lobster shell, security has layers — review code before you run it.

feishuvk97adqphr08hp73y8jb90wqcfx83v5zbimagevk97adqphr08hp73y8jb90wqcfx83v5zblarkvk97adqphr08hp73y8jb90wqcfx83v5zblatestvk97adqphr08hp73y8jb90wqcfx83v5zbsendvk97adqphr08hp73y8jb90wqcfx83v5zb
97downloads
0stars
3versions
Updated 4w ago
v1.0.2
MIT-0

feishu-axiang-send-image - 飞书图片发送技能

技能说明

飞书图片发送技能,使用自有飞书应用配置发送图片到飞书聊天(个人或群聊)。

特点:

  • 🦞 专属配置 - 使用自有的飞书应用配置
  • ⚡ 开箱即用 - 无需配置环境变量
  • 🎯 简化调用 - 只需提供图片路径和目标用户

核心配置

飞书应用信息(硬编码在脚本中):

{
  "appId": "cli_XXX",
  "appSecret": "XXX",
  "accountId": "XXX"
}

允许发送的用户:

  • feishu-axiang-allowFrom.json 中配置允许的用户列表

触发词

  • 发送图片到飞书
  • 发图给我
  • axiang send image

核心原理

两步法:

  1. 调用 im/v1/images API 上传图片到飞书 → 获取 image_key
  2. 调用 im/v1/messages API 发送图片消息 → 获取 message_id

使用方法

方法 1:命令行调用

# 发送图片到个人(默认)
python scripts/send.py --file-path "C:\path\to\image.png"

# 发送到指定用户
python scripts/send.py --file-path "C:\path\to\image.png" --target "ou_xxxxx"

# 发送到群聊
python scripts/send.py --file-path "C:\path\to\image.png" --target "oc_xxxxx" --target-type chat_id

方法 2:Python API 调用

from scripts.send import send_image_to_feishu

# 发送到默认用户
result = send_image_to_feishu("image.png")

# 发送到指定用户
result = send_image_to_feishu("image.png", target="ou_xxxxx", target_type="open_id")

参数说明

参数必需默认值说明
--file-path-本地图片文件路径
--target配置中的默认值目标用户 open_id 或群聊 chat_id
--target-typeopen_id目标类型(open_id/chat_id)

输出示例

Image Sender
   File: C:\Users\your_username\.openclaw\workspace\image.png
   Target: ou_xxxxx (open_id)
   App: cli_XXX (accountId)

Step 1: Get tenant_access_token
   OK Token obtained

Step 2: Upload image to Feishu
   OK Upload success, image_key: img_v3_xxx

Step 3: Send image message
   OK Send success, message_id: om_xxx

Image sent successfully!

支持格式

格式支持说明
PNG推荐格式
JPG/JPEG支持
GIF支持(会自动转换)
WEBP支持

限制

  • 单张图片最大 20MB
  • 仅支持配置允许的用户
  • 需要网络连接

故障排查

错误:open_id cross app

原因: 目标用户不在允许列表中

解决:

  1. 检查目标 open_id 是否正确
  2. feishu-axiang-allowFrom.json 中添加用户

错误:file not found

原因: 图片路径不存在

解决: 检查文件路径是否正确,使用绝对路径

错误:tenant_access_token 获取失败

原因: AppID 或 AppSecret 错误

解决: 检查脚本中的配置是否正确

相关文件

  • scripts/send.py - 主发送脚本
  • feishu-axiang-allowFrom.json - 允许发送的用户列表(需自行配置)

版本历史

  • v1.0 - 初始版本,专属配置

安装后配置

  1. 编辑 scripts/send.py,填入你自己的飞书应用配置:

    • app_id: 你的飞书应用 AppID
    • app_secret: 你的飞书应用 AppSecret
    • default_target: 默认发送目标用户
  2. 创建 feishu-axiang-allowFrom.json 文件,配置允许发送的用户列表

注意事项

⚠️ 安全提示:

  • 不要将包含真实 AppID/AppSecret 的脚本上传到公开仓库
  • 生产环境建议使用环境变量或配置文件管理敏感信息
  • 定期检查允许发送的用户列表

Comments

Loading comments...