Feishu Writing Bundle
Analysis
The skill’s Feishu writing workflow is coherent, but it can read and modify Feishu content and recommends broad full-tool permissions, so users should review its access before installing.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`delete_range` | 删除过时内容 ... `overwrite` | 全文清空重写(慎用,会清评论/图片关联)
The skill documents Feishu update modes that can delete or overwrite document content. This is aligned with an editing skill and it warns against casual overwrite, but users should notice the mutation authority.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
feishu_create_doc 报权限错 | tools.profile 未开 full | 检查 openclaw.json:`tools.profile = "full"`
The artifact recommends enabling a broad full tool profile to resolve Feishu permission errors. That is not narrowly scoped to Feishu writing and is not reflected in the supplied registry requirements.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
- 文档建在了插件账号自己的空间 - 用户当前登录租户与文档所在租户不同 - 用户未完成 OAuth 授权
The skill explicitly relies on Feishu provider/OAuth account boundaries and distinguishes plugin account space from user tenant space. This is expected for Feishu integration, but it affects where documents and data are accessed or created.
