Lark Multi Agent Factory
v1.0.0针对 @larksuite/openclaw-lark 官方插件的多 agent 批量配置工具。当用户说「添加 agent」「新建 agent」「配置飞书」「批量创建 agent」「添加新机器人」,且系统安装的是 @larksuite/openclaw-lark 插件时触发。支持 threadSession、re...
⭐ 0· 48·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description describe batch-creating/configuring Lark/Feishu agents for the @larksuite/openclaw-lark plugin. The included Python script exclusively manipulates ~/.openclaw configuration, creates workspace/agent directories, and checks whether the plugin is installed — all consistent with the stated purpose.
Instruction Scope
SKILL.md and the script limit actions to collecting agent metadata, validating ids/reply modes, writing to ~/.openclaw/openclaw.json, creating workspace/agent files under ~/.openclaw, and optionally calling the local 'openclaw' CLI to check installed plugins. There are no instructions to read unrelated system files, transmit data to external endpoints, or gather extraneous secrets.
Install Mechanism
There is no install spec; this is instruction + local script only, so nothing is downloaded or executed from remote URLs. The script uses standard local filesystem operations and subprocess calls to the 'openclaw' CLI (expected for managing OpenClaw plugins).
Credentials
The skill declares no required environment variables or credentials. It asks the user to provide Feishu/App credentials (AppId and AppSecret) as part of agent creation, and writes those into ~/.openclaw/openclaw.json — this is proportional to its function. The README notes secrets are masked in output; the full secret is stored locally (as expected for account configuration).
Persistence & Privilege
always is false and the skill does not request system-wide privileges. It writes only to its own OpenClaw config area (~/.openclaw) and creates workspace/agent directories under that path. It does not modify other skills' configs or enable persistent/hidden remote access.
Assessment
This tool is a local configuration helper: it will create directories under ~/.openclaw and write agent/account entries (including Feishu AppId/AppSecret) to ~/.openclaw/openclaw.json. Before running: (1) confirm you trust the author because the script will store full app secrets locally; (2) back up your existing ~/.openclaw/openclaw.json; (3) ensure the 'openclaw' CLI on your system is the expected official tool (the script invokes it to check plugins); (4) if you want secrets stored elsewhere, modify the script or manage secrets outside of this helper. If you only want a dry-run first, use the --dry-run option shown in the examples.Like a lobster shell, security has layers — review code before you run it.
latestvk97dztwtbmmkp5ew2xtf4wrsmn84rj7d
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
