扫描报告
25 /100
feishu-doc-collab
Enable real-time AI collaboration in Feishu (Lark) documents — turns any Feishu doc into a live human-AI conversation space with structured in-doc chat protocol and optional Bitable task board integration.
A legitimate Feishu document collaboration skill for OpenClaw. The shell script patching, character-code Python obfuscation, and system file modification are unusual but serve clear, documented purposes with no data exfiltration or credential theft.
可以安装
Approve for use. No undeclared sensitive behavior found. The shell script's Python one-liner obfuscation (character codes) and system file patching are documented. Consider clarifying shell:WRITE in SKILL.md's capability declaration for transparency.
安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | shell:WRITE not declared in allowed-tools section 文档欺骗 | SKILL.md:1 |
| 低危 | Python config extraction uses character-code string obfuscation 代码混淆 | scripts/patch-monitor.sh:47 |
| 低危 | Hardcoded agent name 'MyBot' in patched monitor.js 文档欺骗 | references/monitor-full-patched.js:86 |
| 提示 | System file modification without version control 权限提升 | scripts/patch-monitor.sh:54 |
| 提示 | Reads ~/.openclaw/openclaw.json at runtime 敏感访问 | references/monitor-full-patched.js:75 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | patch-monitor.sh:42 — cp references/monitor-full-patched.js to monitor.js |
| 网络访问 | READ | READ | ✓ 一致 | references/feishu-app-setup.md references open.feishu.cn URLs (documentation) |
| 命令执行 | NONE | WRITE | ✗ 越权 | patch-monitor.sh:1 — set -e; cp; grep; python3; uses Bash extensively, not decla… |
| 环境变量 | NONE | READ | ✗ 越权 | monitor-full-patched.js:75 — reads process.env.HOME for path construction; envir… |
| 技能调用 | NONE | NONE | — | No skill_invoke usage observed |
| 剪贴板 | NONE | NONE | — | No clipboard access |
| 浏览器 | NONE | NONE | — | No browser access |
| 数据库 | NONE | NONE | — | No direct database access |
2 项发现
中危 外部 URL 外部 URL
https://open.feishu.cn/app references/feishu-app-setup.md:16 中危 外部 URL 外部 URL
http://127.0.0.1: references/manual-patch.md:19 目录结构
8 文件 · 29.7 KB · 797 行 Markdown 5f · 528L
JavaScript 1f · 193L
Shell 1f · 68L
JSON 1f · 8L
├─
▾
assets
│ └─
DOC_PROTOCOL_TEMPLATE.md
Markdown
├─
▾
references
│ ├─
bitable-task-protocol.md
Markdown
│ ├─
feishu-app-setup.md
Markdown
│ ├─
manual-patch.md
Markdown
│ └─
monitor-full-patched.js
JavaScript
├─
▾
scripts
│ └─
patch-monitor.sh
Shell
├─
config.json
⚠
JSON
└─
SKILL.md
Markdown
安全亮点
✓ No base64-encoded payloads, eval(), or atob() usage found in any script or JS file
✓ No remote script download (curl|bash, wget|sh) — reference file is bundled locally
✓ No credential exfiltration — hooks token read stays local, used only for localhost authentication
✓ Backup (.bak) is created before patching system files
✓ Idempotent patch — script checks for existing patch markers before modifying files
✓ No ~/.ssh, ~/.aws, .env, or other sensitive credential paths accessed
✓ No network calls to external IPs — all POSTs go to 127.0.0.1 only
✓ Patch mechanism is fully documented in SKILL.md and references/
✓ Anti-loop logic (bot self-edit check) prevents infinite loops
✓ 30-second debounce prevents event storms and token waste