Feishu Bitable API
Analysis
This appears to be a legitimate Feishu Bitable connector, but it deserves review because it can use Feishu app credentials to read, modify, and delete business table data.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`DELETE /bitable/v1/apps/{app_token}/tables/{table_id}` ... `DELETE /bitable/v1/apps/{app_token}/tables/{table_id}/records/{record_id}` ... `POST .../records/batch_delete`The documented API surface includes destructive table, record, and batch-delete operations against Feishu Bitable data.
if (typeof input === 'string' && input.startsWith('@')) { const filePath = input.slice(1); ... return JSON.parse(content); }CLI arguments can reference a local JSON file with @path, and that parsed data can be sent into create/update/batch API calls.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const response = await axios.post('https://open.feishu.cn/open-apis/auth/v3/tenant_access_token/internal/', { app_id: appId, app_secret: appSecret })The skill sends the configured Feishu app ID and secret to Feishu's auth endpoint to obtain a tenant access token.
