MiniMax CLI Web Search

v0.1.1

Web search via MiniMax MCP using a local CLI wrapper (mcporter), with environment preflight, API-key/config checks, and normalized result formatting. Use whe...

2· 1.4k·2 current·3 all-time
bySun@biggersun
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description claim web search via MiniMax MCP using a local CLI wrapper (mcporter). The included script calls 'mcporter call minimax.web_search', verifies mcporter and a minimax server in 'mcporter list --json', and formats results. The requested binaries (mcporter, python3) and config paths (mcporter config referenced in docs) match the stated purpose.
Instruction Scope
SKILL.md instructs only to run the provided wrapper for preflight and queries. The script runs local checks, invokes mcporter, parses JSON with python3, uses mktemp for temporary files and cleans them, and only inspects stderr for auth-related messages. It does not read arbitrary files, exfiltrate data, or call unexpected external endpoints itself (network calls are delegated to mcporter).
Install Mechanism
There is no install spec (instruction-only), so nothing is downloaded or written by the skill installer. The only runtime dependency is an existing 'mcporter' binary and python3 on PATH, which the script checks for at runtime.
Credentials
The skill requests no environment variables or credentials. It relies on the local mcporter configuration for any API keys; the README warns about API-key exposure and advises not printing keys. No unrelated secrets are requested.
Persistence & Privilege
The skill does not request persistent inclusion (always:false) and does not modify other skills or system-wide agent settings. It only executes a local wrapper script when invoked.
Assessment
This skill is a straightforward wrapper around your local 'mcporter' client. Before installing or running it: (1) confirm the 'mcporter' binary on your machine is from a trusted source and inspect its config (e.g., config/mcporter.json) to verify which remote endpoints and API keys it uses; (2) run the script's --preflight manually to confirm it finds the expected 'minimax' server; (3) avoid pasting API keys when running commands and verify the script's temp-file cleanup behavior in your environment if you have stricter disk-security requirements. If you do not already trust or use 'mcporter', investigate that binary/service first — the skill delegates all network access to it.

Like a lobster shell, security has layers — review code before you run it.

clivk971fzmdvtkkdq0zwtsnyv3mad81qngmlatestvk971fzmdvtkkdq0zwtsnyv3mad81qngmmcpvk971fzmdvtkkdq0zwtsnyv3mad81qngmminimaxvk971fzmdvtkkdq0zwtsnyv3mad81qngmsearchvk971fzmdvtkkdq0zwtsnyv3mad81qngm

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments