Skip to main content

lark-integration

Integrates Lark messaging with OpenClaw for seamless bidirectional communication, supporting rich content and document access.

Install this skill

or
33/100

Security score

The lark-integration skill was audited on Feb 9, 2026 and we found 25 security issues across 3 threat categories, including 1 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

high line 143

Curl to non-GitHub URL

SourceSKILL.md
143- Check webhook URL is accessible: `curl http://YOUR_IP:3000/health`
medium line 3

Webhook reference - potential data exfiltration

SourceSKILL.md
3description: Connect Lark (Feishu) messaging to OpenClaw via webhook bridge. Supports text, rich text (post), and image messages bidirectionally. Use when setting up Lark/Feishu as a messaging channel
low line 20

Webhook reference - potential data exfiltration

SourceSKILL.md
20node bridge-webhook.mjs
low line 22

Webhook reference - potential data exfiltration

SourceSKILL.md
22# 3. Configure Lark webhook URL in developer console
low line 24

Webhook reference - potential data exfiltration

SourceSKILL.md
24# URL: http://YOUR_SERVER_IP:3000/webhook
low line 30

Webhook reference - potential data exfiltration

SourceSKILL.md
30Lark App ──webhook──► Bridge (port 3000) ──WebSocket──► OpenClaw Gateway
medium line 58

Webhook reference - potential data exfiltration

SourceSKILL.md
58| `WEBHOOK_PORT` | No | Webhook listen port (default: 3000) |
medium line 81

Webhook reference - potential data exfiltration

SourceSKILL.md
81### bridge-webhook.mjs
medium line 83

Webhook reference - potential data exfiltration

SourceSKILL.md
83Main webhook bridge. Receives Lark events, forwards to OpenClaw, sends replies.
low line 86

Webhook reference - potential data exfiltration

SourceSKILL.md
86FEISHU_APP_ID=cli_xxx node scripts/bridge-webhook.mjs
medium line 143

Webhook reference - potential data exfiltration

SourceSKILL.md
143- Check webhook URL is accessible: `curl http://YOUR_IP:3000/health`
medium line 144

Webhook reference - potential data exfiltration

SourceSKILL.md
144- Verify webhook in Lark console shows "Verified"
low line 14

Access to hidden dotfiles in home directory

SourceSKILL.md
14echo "FEISHU_APP_ID=cli_xxx" >> ~/.openclaw/workspace/.env
low line 15

Access to hidden dotfiles in home directory

SourceSKILL.md
15mkdir -p ~/.openclaw/secrets
low line 16

Access to hidden dotfiles in home directory

SourceSKILL.md
16echo "your_app_secret" > ~/.openclaw/secrets/feishu_app_secret
medium line 57

Access to hidden dotfiles in home directory

SourceSKILL.md
57| `FEISHU_APP_SECRET_PATH` | No | Path to secret file (default: `~/.openclaw/secrets/feishu_app_secret`) |
low line 14

Access to .env file

SourceSKILL.md
14echo "FEISHU_APP_ID=cli_xxx" >> ~/.openclaw/workspace/.env
low line 23

External URL reference

SourceSKILL.md
23# https://open.larksuite.com → Your App → Event Subscriptions
low line 24

External URL reference

SourceSKILL.md
24# URL: http://YOUR_SERVER_IP:3000/webhook
low line 47

External URL reference

SourceSKILL.md
47- `*.larksuite.com` → `https://open.larksuite.com` (International)
low line 48

External URL reference

SourceSKILL.md
48- `*.feishu.cn` → `https://open.feishu.cn` (China)
low line 125

External URL reference

SourceSKILL.md
125node skills/feishu-doc/index.js fetch "https://xxx.larksuite.com/docx/TOKEN"
low line 143

External URL reference

SourceSKILL.md
143- Check webhook URL is accessible: `curl http://YOUR_IP:3000/health`
low line 169

External URL reference

SourceSKILL.md
169- [Lark Developer Console](https://open.larksuite.com/) (International)
low line 170

External URL reference

SourceSKILL.md
170- [Feishu Developer Console](https://open.feishu.cn/) (China)
Scanned on Feb 9, 2026
View Security Dashboard