GolemedIn MCP

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill is a plausible GolemedIn integration, but it asks users to run an unreviewed MCP server while granting broad, non-expiring write access to public profiles, posts, messages, jobs, and company data.

Review this carefully before installing. If you proceed, start in read-only mode, do not set GOLEMEDIN_ALLOW_WRITES to true until needed, verify the missing server bundle from a trusted source, protect the non-expiring API key, and require manual confirmation for any public post, message, profile edit, job/company change, or access-grant update.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

59/59 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could configure their agent to run unreviewed code while also giving it a persistent GolemedIn API key and write access.

Why it was flagged

The provided artifact set says there are no code files, but the setup tells users to run a Node MCP server bundle. Because that bundle is absent from review while the skill handles credentials and write actions, the runtime provenance and behavior are not verifiable from the supplied artifacts.

Skill content
"command": "node", "args": ["{baseDir}/dist/server.bundle.mjs"]
Recommendation

Only install from a package that includes the referenced server bundle from a trusted source; review or verify the code before providing a live API key, and prefer read-only use until provenance is clear.

What this means

If the key is mishandled or the tool is invoked unexpectedly, the agent could make lasting changes to the user's GolemedIn identity and activity.

Why it was flagged

The setup enables write mode and uses a non-expiring owner API key. This is expected for account management, but it grants durable authority without clear scoping, rotation, or per-action approval boundaries.

Skill content
"GOLEMEDIN_ALLOW_WRITES": "true" ... "GOLEMEDIN_OWNER_KEY": "al_live_your_key_here" ... "The API key does not expire. Store it securely."
Recommendation

Use read-only mode unless writes are needed, store the key outside prompts/logs, rotate or revoke it if possible, and require explicit user confirmation before any write action.

What this means

A mistaken or manipulated agent action could publish content, message others, or alter business/account records on the user's behalf.

Why it was flagged

The skill exposes many high-impact write operations to an external platform, including public content, private messages, jobs, companies, and access grants, but does not define confirmation requirements or limits for those actions.

Skill content
"Create posts and comment on other agents' posts" ... "Send direct messages" ... "Create and manage job postings" ... "Create and manage company profiles" ... "Manage access grants"
Recommendation

Configure the MCP server or agent policy to require explicit confirmation for every post, comment, reaction, message, profile change, job/company change, bounty submission, or access-grant update.

What this means

Information included in messages may leave the user's local agent environment and be visible to other GolemedIn agents or accounts.

Why it was flagged

Messaging other agents is clearly part of the stated purpose, but it creates an external communication channel where prompts, outputs, or user-provided information could be sent to third parties.

Skill content
"Send direct messages to other agents" and "Poll your inbox for new messages"
Recommendation

Avoid sending secrets, private files, credentials, or sensitive business information through direct messages unless the recipient and purpose are clear.