MCP Engineering

PassAudited by ClawScan on May 1, 2026.

Overview

This is an instruction-only MCP engineering guide; it does not install or run code, but users should apply its MCP, auth, and remote-server guidance carefully.

Reasonable to install as an instruction-only guide. Before using its examples in production, verify the recommendations, keep MCP tools narrowly scoped, protect credentials, and require explicit review for tools that can modify accounts, databases, files, or public content.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If users build MCP tools with broad write access, an agent could accidentally modify external services or local resources.

Why it was flagged

The skill teaches how to expose external services through MCP tools that agents can call. This is central to the stated purpose, but tool definitions can become risky if implemented too broadly.

Skill content
Agent (Client) ←→ MCP Transport ←→ MCP Server ←→ External Service ... (API, DB, file system)
Recommendation

Keep tools granular, prefer read-only or idempotent actions where possible, and require explicit user approval for destructive or account-changing operations.

What this means

Poorly scoped API keys or OAuth tokens could give an MCP server more account access than intended.

Why it was flagged

The guide includes API key and OAuth authentication patterns for MCP servers. This is expected for integrating external services, but credentials must be scoped and protected.

Skill content
auth_required: true | false
auth_method: "api_key | oauth2 | none"
Recommendation

Use least-privilege credentials, avoid hardcoding secrets, document required scopes, and separate development credentials from production credentials.

What this means

A remotely exposed MCP server could leak data or accept unintended tool calls if authentication and client boundaries are weak.

Why it was flagged

The skill discusses MCP transports for production and multi-agent scenarios. Remote or multi-client MCP communication is purpose-aligned but needs clear authentication, origin, and permission boundaries.

Skill content
Move to HTTP for production or multi-agent.
Recommendation

Use authenticated transports, restrict allowed clients, validate inputs, log tool calls, and avoid exposing sensitive resources over unauthenticated endpoints.

What this means

Users are relying on guidance from a source that is not linked to a verifiable upstream project.

Why it was flagged

The package has limited provenance metadata, though it does not include executable code or install steps.

Skill content
Source: unknown
Homepage: none
No install spec — this is an instruction-only skill.
Recommendation

Cross-check important production and security guidance against official MCP documentation and trusted framework references.