feishu-audio

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: feishu-audio Version: 1.0.1 The skill bundle is classified as suspicious due to a shell injection vulnerability in `scripts/send_audio.sh`. The script directly embeds user-controlled input (`$AUDIO_FILE` and `$OPUS_FILE`) into `ffmpeg` and `ffprobe` commands without proper sanitization or quoting. This flaw could allow an attacker to inject arbitrary shell commands if they can control the audio file path provided to the script, potentially leading to remote code execution. While there is no clear evidence of intentional malicious behavior (e.g., data exfiltration to unauthorized endpoints, backdoors), this vulnerability represents a significant security risk.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone invoking the skill with valid Feishu credentials can send audio messages through that Feishu bot/app.

Why it was flagged

The script uses Feishu application credentials to obtain a tenant access token, which is expected for sending Feishu bot messages but is still delegated account authority.

Skill content
APP_ID="${FEISHU_APP_ID}"
APP_SECRET="${FEISHU_APP_SECRET}"
... tenant_access_token/internal
Recommendation

Use a least-privilege Feishu app, protect the app secret, and verify the recipient Open ID before running the script.

What this means

The selected audio file may contain private information and will be sent to Feishu before being delivered as a message.

Why it was flagged

The converted local audio file is uploaded to Feishu’s API, which is necessary for the skill but means local audio content is transmitted to an external service.

Skill content
curl -s -X POST "https://open.feishu.cn/open-apis/im/v1/files" ... -F "file=@$OPUS_FILE"
Recommendation

Only use the skill with audio files you are comfortable uploading to Feishu, and confirm the intended recipient.

What this means

Running the skill executes local media-processing commands and writes a temporary opus file under /tmp.

Why it was flagged

The skill runs local command-line tools to process a user-supplied audio file path; this is central to the stated audio conversion purpose and arguments are quoted.

Skill content
ffmpeg -i "$AUDIO_FILE" -c:a libopus -b:a 24k -ar 24000 -ac 1 -y "$OPUS_FILE"
Recommendation

Run it only on audio files you selected and ensure ffmpeg/jq/curl are trusted local installations.

What this means

Installation metadata may not warn users up front that credentials and local tools are needed.

Why it was flagged

The registry metadata under-declares operational requirements that are disclosed in SKILL.md and used by the script, including Feishu credentials and local command-line tools.

Skill content
Required binaries (all must exist): none
Required env vars: none
Primary credential: none
Recommendation

Before installing, note the documented requirements: ffmpeg, Feishu app ID/secret, a receiver Open ID, and working curl/jq tooling.