Back to skill
Skillv1.0.2

ClawScan security

Feishu Log · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousMar 13, 2026, 9:22 AM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill largely does what it claims (write structured logs to Feishu) but contains several inconsistencies and risky practices (undeclared required credentials, hard-coded default credentials, and reading/writing OpenClaw config files) that warrant caution before installing.
Guidance
What you should check before installing/use: - Expectation vs reality: The skill's metadata said no env vars, but the code and SKILL.md require FEISHU_APP_ID and FEISHU_APP_SECRET (and a DEFAULT_OWNER_ID). Don't rely on the registry metadata alone. - Credentials in code: Several source files include hard-coded default app_id, app_secret, and folder tokens. Treat these as suspicious — they may be placeholders, but you should not use them. Replace with credentials from an app you control. - Tenant-level token: The skill uses tenant_access_token (app-level credential) which can access and modify Drive/docs across the tenant. Give the app minimal scopes and use a dedicated Feishu app with only needed permissions. - Persistent writes: The skill will read and write files under ~/.openclaw (e.g., .env, feishu-credentials.json, openclaw.json). Review and backup those files before running; inspect saved credential files and consider encrypting or restricting file permissions. - Permission actions: It will add the configured user as full_access collaborator on created folders. Make sure you understand and accept that behavior. - Recommended mitigations: run the code in a sandbox or test account first; create a dedicated Feishu app with minimal permissions and use its credentials; remove any hard-coded secrets from the code; verify the skill only uses expected API endpoints; and review the files it will create/modify under your home directory. - If you are unsure: do not run with organization-level or production credentials until you or your security team have audited the code and replaced hard-coded values with credentials you control.

Review Dimensions

Purpose & Capability
concernThe skill's stated purpose (write structured logs to Feishu) matches the code. However registry metadata declares no required environment variables while SKILL.md and the code clearly require FEISHU_APP_ID, FEISHU_APP_SECRET and a DEFAULT_OWNER_ID (or equivalent config files). The code also contains built-in default app_id/app_secret and folder tokens which are unexpected in a published skill and may indicate leaked/placeholder credentials. Requiring tenant-level app credentials (tenant_access_token) is coherent for this integration, but the metadata omission and hard-coded defaults are inconsistent.
Instruction Scope
concernSKILL.md describes using tenant_access_token and creating folders/docs — consistent. But runtime instructions and code do more: they read/write files under the user's home (~/.openclaw/workspace/.env, ~/.openclaw/feishu-credentials.json, ~/.openclaw/openclaw.json), offer an interactive credential configurator, and indicate automatic adding of users as full_access collaborators. Reading the global OpenClaw config to pull credentials and writing persistent credential files expands scope beyond ephemeral API calls and should be reviewed by the user.
Install Mechanism
okThere is no remote install step; this is instruction + local code only. No external download URLs or extract steps are present. That lowers supply-chain risk compared to remote installers.
Credentials
concernThe skill legitimately needs Feishu app credentials (app_id/app_secret) to obtain a tenant_access_token. However: (1) the registry metadata claims no required env vars while SKILL.md and code require them; (2) multiple files contain hard-coded default app_id/app_secret and folder tokens (placeholders or real) — storing credentials in source is risky; (3) the skill requests tenant-level capability (drive/docx and permission management) which grants broad access to the organization's files. These factors together increase the blast radius if credentials are misused.
Persistence & Privilege
noteThe skill does not set always:true and does not request elevated agent privileges. However it persists credentials/config to the user's home (~/.openclaw/...), and will add users as collaborators with full_access on created folders. Persisting app secrets to disk and modifying OpenClaw config are permanent actions the user should explicitly consent to.