MCP Engineering

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: afrexai-mcp-engineering Version: 1.0.0 The skill bundle provides a comprehensive guide for building, integrating, securing, and scaling Model Context Protocol (MCP) servers. Both SKILL.md and README.md are educational in nature, offering detailed instructions, code templates, and best practices. Crucially, the SKILL.md explicitly identifies and warns against 'Dangerous Tool Patterns' such as SQL injection, shell command execution, SSRF, and arbitrary file writes, providing 'Safe Alternatives' and a thorough 'Security Checklist'. There is no evidence of prompt injection against the agent, data exfiltration, unauthorized execution, or any other malicious intent. The content is entirely aligned with its stated purpose of secure MCP engineering.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If users build MCP tools with broad write access, an agent could accidentally modify external services or local resources.

Why it was flagged

The skill teaches how to expose external services through MCP tools that agents can call. This is central to the stated purpose, but tool definitions can become risky if implemented too broadly.

Skill content
Agent (Client) ←→ MCP Transport ←→ MCP Server ←→ External Service ... (API, DB, file system)
Recommendation

Keep tools granular, prefer read-only or idempotent actions where possible, and require explicit user approval for destructive or account-changing operations.

What this means

Poorly scoped API keys or OAuth tokens could give an MCP server more account access than intended.

Why it was flagged

The guide includes API key and OAuth authentication patterns for MCP servers. This is expected for integrating external services, but credentials must be scoped and protected.

Skill content
auth_required: true | false
auth_method: "api_key | oauth2 | none"
Recommendation

Use least-privilege credentials, avoid hardcoding secrets, document required scopes, and separate development credentials from production credentials.

What this means

A remotely exposed MCP server could leak data or accept unintended tool calls if authentication and client boundaries are weak.

Why it was flagged

The skill discusses MCP transports for production and multi-agent scenarios. Remote or multi-client MCP communication is purpose-aligned but needs clear authentication, origin, and permission boundaries.

Skill content
Move to HTTP for production or multi-agent.
Recommendation

Use authenticated transports, restrict allowed clients, validate inputs, log tool calls, and avoid exposing sensitive resources over unauthenticated endpoints.

What this means

Users are relying on guidance from a source that is not linked to a verifiable upstream project.

Why it was flagged

The package has limited provenance metadata, though it does not include executable code or install steps.

Skill content
Source: unknown
Homepage: none
No install spec — this is an instruction-only skill.
Recommendation

Cross-check important production and security guidance against official MCP documentation and trusted framework references.