飞书文档API技能

ReviewAudited by ClawScan on May 10, 2026.

Overview

This is a coherent Feishu document automation skill, but it can read, change, delete, and share Feishu documents using your app credentials.

Install only if you trust the source and need an agent to manage Feishu documents. Use least-privilege Feishu app permissions, keep FEISHU_APP_SECRET out of shell history, verify document IDs and sharing recipients, and avoid letting the agent read arbitrary local files as document content.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked with the wrong document ID, folder token, user ID, or content file, the agent could overwrite, delete, or share Feishu documents.

Why it was flagged

The skill explicitly supports creating, reading, replacing, deleting, and sharing Feishu documents. These are expected for the stated purpose, but they can materially affect cloud documents.

Skill content
| 文档 CRUD | 创建、获取、更新(全量替换)、删除文档 | ... | 权限管理 | 添加协作者、查看权限成员列表 |
Recommendation

Use it only with clear user instructions for document-changing actions, verify document IDs and recipients, and keep backups or version history for important documents.

What this means

Sensitive local files could be uploaded into a Feishu document if selected accidentally or by an over-broad agent instruction.

Why it was flagged

The CLI can read a user-specified local file and use it as document content. This is useful and disclosed, but it can send local file contents into Feishu if the wrong file path is supplied.

Skill content
if (options.contentFile) {
        content = fs.readFileSync(options.contentFile, 'utf8');
      }
Recommendation

Only provide explicit, intended content-file paths and avoid letting the agent choose arbitrary local files for upload.

What this means

The configured Feishu app may be able to read and modify documents and files within its granted tenant scope.

Why it was flagged

The setup instructions require Feishu Drive read/write permissions, which are appropriate for this integration but grant broad authority over accessible documents and files.

Skill content
- `drive:drive:readonly` - 读取云文档
- `drive:drive:write` - 写入云文档
- `drive:file:readonly` - 读取文件
- `drive:file:write` - 写入文件
Recommendation

Grant the minimum Feishu permissions needed, restrict app access where possible, and rotate the App Secret if it may have been exposed.

What this means

Your Feishu App Secret could be visible to other local users or retained in command history if passed on the command line.

Why it was flagged

The skill allows credentials to be passed as command-line arguments. This is functional, but command-line secrets can be exposed through shell history or process listings.

Skill content
所有命令均支持 `--app-id` 和 `--app-secret` 参数覆盖环境变量。
Recommendation

Prefer environment variables or a protected secrets manager over CLI flags for Feishu credentials.

What this means

Installing dependencies could pull code from the npm ecosystem if the lockfile is not honored or the package source is not trusted.

Why it was flagged

The skill uses normal npm dependencies. A lockfile is included, but caret ranges in package.json and the unknown source/homepage mean users should still verify provenance before installing.

Skill content
"dependencies": {
    "axios": "^1.6.0",
    "commander": "^11.0.0",
    "dotenv": "^16.3.1"
  }
Recommendation

Install from a trusted source, use the provided lockfile, and review dependency updates before upgrading.