Telebiz Mcp

v0.1.0

Access Telegram data via MCP using the telebiz-tt browser client. Lists chats, reads messages, searches, manages folders, and sends messages through an authenticated Telegram session.

1· 1.7k·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
Name/description match the implementation: code provides a relay (WebSocket), HTTP wrapper, daemon, and MCP stdio server to use telebiz-tt (browser executor) as an authenticated Telegram toolset. The npm package dependency and use of a 'telebiz-mcp' subprocess is consistent with the described architecture.
!
Instruction Scope
Runtime instructions ask you to install the telebiz package, open telebiz.io in a browser, and start local servers. The code does additional actions not highlighted prominently in SKILL.md: it writes PID/log/state files to your HOME, auto-restarts subprocesses, and exposes an HTTP API and WebSocket relay. Those behaviors are plausible for the described function but SKILL.md does not warn that the HTTP/WebSocket servers bind to all network interfaces or that CORS is set to '*', which can expose an authenticated session beyond localhost if the host is reachable.
Install Mechanism
There is no registry install spec in the skill bundle, but SKILL.md tells users to npm install -g @telebiz/telebiz-mcp (a normal approach). The bundled package.json and source files show only standard dependencies (@modelcontextprotocol/sdk and ws). No external arbitrary download URLs or obfuscated code were observed in the provided files.
Credentials
The skill does not require credentials or secrets. It reads conventional env vars (HOME and optional TELEBIZ_* variables to override ports/paths). No unrelated credentials or broad secret access are requested.
!
Persistence & Privilege
The code installs/starts long-running processes (daemon, HTTP server, relay), writes PID/state/log files in the user's HOME and auto-restarts the MCP subprocess. There is also a telebiz-service.sh file (likely for system service installation) — SKILL.md suggests running start scripts. Persistent daemons combined with network-listening services increase attack surface; the skill is not force-included (always:false) but will create persistent presence if you follow the setup.
What to consider before installing
This skill appears to do what it claims (bridge an authenticated telebiz browser session to an MCP API), but take precautions before installing: - Network exposure: by default the relay and HTTP server bind to all interfaces (0.0.0.0) and the HTTP server sets Access-Control-Allow-Origin: *. That means if your machine is reachable on the network, remote hosts could talk to the service and indirectly act using your logged-in Telegram session. Only run this on a trusted, firewalled host or change bindings to 127.0.0.1. - Limit interfaces: set TELEBIZ_HTTP_PORT/TELEBIZ_PORT/TELEBIZ_RELAY_URL or edit the server code to listen only on 127.0.0.1, or run the service inside a local-only container or VM. - Review startup scripts: inspect start-http.sh, start-relay.sh, and telebiz-service.sh before running them — telebiz-service.sh may install a systemd service or otherwise create persistent system-level configuration. - Principle of least privilege: do not run as root. Keep the service confined to a dedicated user or container. - Authenticate and audit: the skill will be able to read and send messages using your authenticated browser session — treat it like any other app with access to your account. Only install if you trust the telebiz package source and the skill code; consider running it in an isolated environment first. - If you want to proceed: change the server listen calls to bind to 127.0.0.1 (or add host argument), remove or tighten the CORS wildcard, and ensure your firewall blocks external access to ports 9716/9717/9718 (or whichever you use). If you cannot validate the telebiz package origin or you need to expose functionality to other hosts, audit the code carefully and prefer running it inside a network-restricted container/VM.

Like a lobster shell, security has layers — review code before you run it.

latestvk972va88w43srhbws3745v7mxx80c27s

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📱 Clawdis

Comments