Exa Web Search V2
PassAudited by ClawScan on May 1, 2026.
Overview
This is a coherent instruction-only Exa web search skill, with disclosed remote MCP use and minor provenance/metadata inconsistencies users should notice.
This skill appears safe to use for web, code, and company search if you are comfortable sending queries to Exa. Before installing, verify the metadata mismatch is acceptable, and avoid putting private code, credentials, confidential business information, or personal data into search prompts.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Users may want to verify they are installing the intended Exa skill because the registry and packaged metadata do not fully align.
The packaged metadata differs from the supplied registry identity for the evaluated skill, which lists a different slug/version. This is a provenance and identity consistency note, not evidence of unsafe behavior.
"slug": "exa-web-search-free", "version": "1.0.1"
Confirm the skill name, slug, and source before installing, especially since the registry source and homepage are not declared.
Anything included in search queries, company names, URLs, or code-search prompts may be shared with the Exa MCP service.
The skill directs users to configure a remote MCP endpoint, so search queries and tool inputs are sent to an external provider. This is expected for the skill's search purpose.
mcporter config add exa https://mcp.exa.ai/mcp
Avoid sending secrets, private code, confidential business details, or personal data in queries unless you are comfortable sharing them with the provider.
If enabled, the agent has more ways to query or retrieve public web information through Exa, including profile searches and longer research tasks.
The optional configuration expands the available MCP tool surface to include crawling, people search, and a deep researcher. The artifact clearly labels this as optional and shows user-directed commands.
Enable all tools: mcporter config add exa-full "https://mcp.exa.ai/mcp?tools=web_search_exa,web_search_advanced_exa,get_code_context_exa,deep_search_exa,crawling_exa,company_research_exa,people_search_exa,deep_researcher_start,deep_researcher_check"
Enable the full tool set only when needed, review what query or URL is being sent, and keep sensitive information out of tool inputs.
