Scan Report
25 /100
feishu-doc-collab
Enable real-time AI collaboration in Feishu (Lark) documents — turns any Feishu doc into a live human-AI conversation space with structured in-doc chat protocol and optional Bitable task board integration.
A legitimate Feishu document collaboration skill for OpenClaw. The shell script patching, character-code Python obfuscation, and system file modification are unusual but serve clear, documented purposes with no data exfiltration or credential theft.
Safe to install
Approve for use. No undeclared sensitive behavior found. The shell script's Python one-liner obfuscation (character codes) and system file patching are documented. Consider clarifying shell:WRITE in SKILL.md's capability declaration for transparency.
Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| Low | shell:WRITE not declared in allowed-tools section Doc Mismatch | SKILL.md:1 |
| Low | Python config extraction uses character-code string obfuscation Obfuscation | scripts/patch-monitor.sh:47 |
| Low | Hardcoded agent name 'MyBot' in patched monitor.js Doc Mismatch | references/monitor-full-patched.js:86 |
| Info | System file modification without version control Priv Escalation | scripts/patch-monitor.sh:54 |
| Info | Reads ~/.openclaw/openclaw.json at runtime Sensitive Access | references/monitor-full-patched.js:75 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | patch-monitor.sh:42 — cp references/monitor-full-patched.js to monitor.js |
| Network | READ | READ | ✓ Aligned | references/feishu-app-setup.md references open.feishu.cn URLs (documentation) |
| Shell | NONE | WRITE | ✗ Violation | patch-monitor.sh:1 — set -e; cp; grep; python3; uses Bash extensively, not decla… |
| Environment | NONE | READ | ✗ Violation | monitor-full-patched.js:75 — reads process.env.HOME for path construction; envir… |
| Skill Invoke | NONE | NONE | — | No skill_invoke usage observed |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser access |
| Database | NONE | NONE | — | No direct database access |
2 findings
Medium External URL 外部 URL
https://open.feishu.cn/app references/feishu-app-setup.md:16 Medium External URL 外部 URL
http://127.0.0.1: references/manual-patch.md:19 File Tree
8 files · 29.7 KB · 797 lines Markdown 5f · 528L
JavaScript 1f · 193L
Shell 1f · 68L
JSON 1f · 8L
├─
▾
assets
│ └─
DOC_PROTOCOL_TEMPLATE.md
Markdown
├─
▾
references
│ ├─
bitable-task-protocol.md
Markdown
│ ├─
feishu-app-setup.md
Markdown
│ ├─
manual-patch.md
Markdown
│ └─
monitor-full-patched.js
JavaScript
├─
▾
scripts
│ └─
patch-monitor.sh
Shell
├─
config.json
⚠
JSON
└─
SKILL.md
Markdown
Security Positives
✓ No base64-encoded payloads, eval(), or atob() usage found in any script or JS file
✓ No remote script download (curl|bash, wget|sh) — reference file is bundled locally
✓ No credential exfiltration — hooks token read stays local, used only for localhost authentication
✓ Backup (.bak) is created before patching system files
✓ Idempotent patch — script checks for existing patch markers before modifying files
✓ No ~/.ssh, ~/.aws, .env, or other sensitive credential paths accessed
✓ No network calls to external IPs — all POSTs go to 127.0.0.1 only
✓ Patch mechanism is fully documented in SKILL.md and references/
✓ Anti-loop logic (bot self-edit check) prevents infinite loops
✓ 30-second debounce prevents event storms and token waste