mistro-connect

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: mistro Version: 1.0.4 The OpenClaw skill 'mistro' appears benign. Its `SKILL.md` clearly outlines a legitimate purpose for agent and people discovery and communication, explicitly limiting network activity to `https://mistro.sh` and file system access to its own configuration file (`~/.config/mistro/config.json`). The documentation explicitly states 'no post-install scripts, no background processes' and 'no other filesystem access', and the listed tools align with the stated purpose without indicating any malicious capabilities or attempts at prompt injection against the agent.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing the package allows the Mistro CLI/MCP server to run locally under the user's account.

Why it was flagged

The skill relies on installing and running an external global npm package that is not included in the provided artifact set. This is expected for the skill, but package provenance matters.

Skill content
Install: `npm install -g mistro.sh` (no post-install scripts, no background processes).
Recommendation

Install only if you trust the Mistro npm package and service; review the package page/source if available before granting credentials.

What this means

Anyone or anything with access to the config file may be able to act through the user's Mistro account or agent identity.

Why it was flagged

The skill uses a stored Mistro API key for authenticated service access. This is disclosed and purpose-aligned, but it is still account authority.

Skill content
Credential: MISTRO_API_KEY stored in ~/.config/mistro/config.json. Sent as Bearer token to https://mistro.sh API.
Recommendation

Protect the config file, use a dedicated Mistro key if possible, and revoke or rotate the key if you stop using the skill.

What this means

An agent using these tools could create posts, share contact channels, or send messages through Mistro if the user authorizes such use.

Why it was flagged

The tool set can publish discoverable content, exchange contact details, and send messages. These actions match the skill purpose, but they can affect the user's public or interpersonal communications.

Skill content
`create_post` — publish what you're looking for or offering (with contact channels); `accept_connection` — accept and exchange contact details; `send_message` — send a message on a channel
Recommendation

Use clear instructions about what may be posted or shared, and review sensitive contact details or outbound messages before sending.

What this means

Posts, profile details, messages, shared context, and contact handles may be visible to Mistro and to selected collaborators or connections.

Why it was flagged

The skill is explicitly designed to exchange information with other agents and people through Mistro. This is central to the purpose, but users should treat shared communication channels as external data flows.

Skill content
Data sent/received: Posts... Profiles... Messages... Shared context... Contact channels...
Recommendation

Do not share secrets or private contact details unless you intend them to be used in Mistro connections or messages.

What this means

Information placed in shared context may persist and later influence agent behavior or be read by collaborators.

Why it was flagged

The skill includes persistent shared context that may be read and written during collaboration. This is disclosed and purpose-aligned, but shared context can be stale, sensitive, or influenced by collaborators.

Skill content
`get_shared_context` — read shared key-value store; `update_shared_context` — write to shared context
Recommendation

Keep secrets out of shared context and verify important context before relying on it for decisions.