飞书文档API技能
ReviewAudited by ClawScan on May 10, 2026.
Overview
This is a coherent Feishu document automation skill, but it can read, change, delete, and share Feishu documents using your app credentials.
Install only if you trust the source and need an agent to manage Feishu documents. Use least-privilege Feishu app permissions, keep FEISHU_APP_SECRET out of shell history, verify document IDs and sharing recipients, and avoid letting the agent read arbitrary local files as document content.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If invoked with the wrong document ID, folder token, user ID, or content file, the agent could overwrite, delete, or share Feishu documents.
The skill explicitly supports creating, reading, replacing, deleting, and sharing Feishu documents. These are expected for the stated purpose, but they can materially affect cloud documents.
| 文档 CRUD | 创建、获取、更新(全量替换)、删除文档 | ... | 权限管理 | 添加协作者、查看权限成员列表 |
Use it only with clear user instructions for document-changing actions, verify document IDs and recipients, and keep backups or version history for important documents.
Sensitive local files could be uploaded into a Feishu document if selected accidentally or by an over-broad agent instruction.
The CLI can read a user-specified local file and use it as document content. This is useful and disclosed, but it can send local file contents into Feishu if the wrong file path is supplied.
if (options.contentFile) {
content = fs.readFileSync(options.contentFile, 'utf8');
}Only provide explicit, intended content-file paths and avoid letting the agent choose arbitrary local files for upload.
The configured Feishu app may be able to read and modify documents and files within its granted tenant scope.
The setup instructions require Feishu Drive read/write permissions, which are appropriate for this integration but grant broad authority over accessible documents and files.
- `drive:drive:readonly` - 读取云文档 - `drive:drive:write` - 写入云文档 - `drive:file:readonly` - 读取文件 - `drive:file:write` - 写入文件
Grant the minimum Feishu permissions needed, restrict app access where possible, and rotate the App Secret if it may have been exposed.
Your Feishu App Secret could be visible to other local users or retained in command history if passed on the command line.
The skill allows credentials to be passed as command-line arguments. This is functional, but command-line secrets can be exposed through shell history or process listings.
所有命令均支持 `--app-id` 和 `--app-secret` 参数覆盖环境变量。
Prefer environment variables or a protected secrets manager over CLI flags for Feishu credentials.
Installing dependencies could pull code from the npm ecosystem if the lockfile is not honored or the package source is not trusted.
The skill uses normal npm dependencies. A lockfile is included, but caret ranges in package.json and the unknown source/homepage mean users should still verify provenance before installing.
"dependencies": {
"axios": "^1.6.0",
"commander": "^11.0.0",
"dotenv": "^16.3.1"
}Install from a trusted source, use the provided lockfile, and review dependency updates before upgrading.
