Back to skill
v1.0.0

Feishu Bitable API

ReviewClawScan verdict for this skill. Analyzed May 1, 2026, 5:25 AM.

Analysis

This appears to be a legitimate Feishu Bitable connector, but it deserves review because it can use Feishu app credentials to read, modify, and delete business table data.

GuidanceInstall only if you trust the publisher and need an agent to operate Feishu Bitable. Use a dedicated least-privilege Feishu app, limit access to the necessary tables, keep secrets out of logs and shared configs, require confirmation for destructive or bulk changes, and avoid importing local files unless you intend their contents to be sent to Feishu.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Tool Misuse and Exploitation
SeverityHighConfidenceHighStatusConcern
SKILL.md
`DELETE /bitable/v1/apps/{app_token}/tables/{table_id}` ... `DELETE /bitable/v1/apps/{app_token}/tables/{table_id}/records/{record_id}` ... `POST .../records/batch_delete`

The documented API surface includes destructive table, record, and batch-delete operations against Feishu Bitable data.

User impactIf invoked incorrectly or too broadly, the skill could delete or alter important Feishu Bitable records or tables.
RecommendationUse a least-privilege Feishu app, restrict it to only needed Bitables, back up important tables, and require explicit human approval for delete, batch update, and batch delete actions.
Tool Misuse and Exploitation
SeverityLowConfidenceHighStatusNote
src/utils.js
if (typeof input === 'string' && input.startsWith('@')) { const filePath = input.slice(1); ... return JSON.parse(content); }

CLI arguments can reference a local JSON file with @path, and that parsed data can be sent into create/update/batch API calls.

User impactA local JSON file may be uploaded into Feishu Bitable if the agent or user supplies it as command input.
RecommendationOnly use @file inputs for files intentionally meant to be imported, and avoid pointing the skill at local files containing unrelated sensitive data.
Permission boundary

Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.

Identity and Privilege Abuse
SeverityMediumConfidenceHighStatusNote
src/utils.js
const response = await axios.post('https://open.feishu.cn/open-apis/auth/v3/tenant_access_token/internal/', { app_id: appId, app_secret: appSecret })

The skill sends the configured Feishu app ID and secret to Feishu's auth endpoint to obtain a tenant access token.

User impactThe configured Feishu app credentials determine what Bitable data the agent can read or change.
RecommendationStore the app secret securely, rotate it if exposed, and grant only the Feishu permissions and Bitable access required for the intended workflow.