Feishu Messaging

v0.0.3

飞书消息发送与文档创建工作流。 触发场景:查找群成员、查找群ID、发送消息失败需要重新尝试。 适用于:发送飞书消息。

19· 11.5k·120 current·126 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The SKILL.md demonstrates Feishu API usage (search chats, send messages, upload images/files, list members) which aligns with the stated purpose of sending Feishu messages and managing related resources. Minor mismatch: the description mentions document creation but no example for document creation is provided.
!
Instruction Scope
Instructions include runnable code that requires app_id/app_secret, opens local files (e.g., '小鸭子.jpg', mp4 files) and posts them to Feishu. The SKILL.md logs raw API responses and shows example UUID handling. These runtime actions involve reading local files and sending data to an external service and are not reflected in the declared requirements.
Install Mechanism
Instruction-only skill with no install spec or bundled code — lowest install risk. It references the lark_oapi SDK but does not attempt to install it itself.
!
Credentials
The metadata lists no required environment variables or credentials, yet every example uses YOUR_APP_ID and YOUR_APP_SECRET (app credentials) and requires Feishu bot scopes. That mismatch is inconsistent and could lead to unexpected prompts for secrets or ad-hoc credential use. The skill also reads local file paths but declares no required config paths.
Persistence & Privilege
always is false and there is no install-time behavior or claims to modify other skills or system settings. The skill does not request persistent/automatic inclusion privileges.
What to consider before installing
This skill appears to be a plain instruction guide for using the Feishu (Lark) SDK, but there are mismatches you should consider before installing or using it: - Credentials: The examples require an app_id and app_secret and bot scopes (im:message:send_as_bot, etc.), but the skill metadata declares no required credentials. That means the skill may expect you to supply secrets at runtime — only provide these for a dedicated, limited-permission Feishu app and rotate them after testing. - File access and data exfiltration: Example code opens local files and uploads them to Feishu. If you run this skill (or allow an agent to run it), ensure it won’t automatically access sensitive files. Limit the agent’s working directory and verify what will be uploaded. - Source and provenance: The skill has no homepage and unknown source. Prefer official or well-documented Feishu integrations. Ask the publisher for the origin, intended deployment model, and whether this is just documentation rather than executable instructions. - Least privilege: If you proceed, create an app with the minimum required scopes, do not reuse high-privilege org credentials, and audit activity logs in Feishu for unexpected messages/uploads. - Validation: Because the skill is instruction-only, review the actual commands the agent will run. Consider running examples in an isolated environment first. If you need help assessing what exact permissions to grant or how to sandbox the skill, provide how you plan to invoke it (interactive vs autonomous agent) and I can give concrete hardening steps.

Like a lobster shell, security has layers — review code before you run it.

latestvk9716cthgdme9rxgevq29jjn5h80m3kw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments