Feishu Group Ops
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill requires access to sensitive local configuration files (~/.openclaw/openclaw.json) to extract Feishu App IDs and Secrets. It implements a non-standard third-party billing mechanism via 'skillpay.me', which involves sending user identifiers to an external endpoint for every 'write' operation. Furthermore, scripts/feishu.py contains a hardcoded API key and a significant syntax/indentation error in the _skillpay_headers function that would cause the script to crash during authenticated requests to the billing service, indicating either poor code quality or an untested payment gate.
