Filesystem MCP Server

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: filesystem-mcp Version: 1.0.0 The skill bundle describes a 'Filesystem MCP Server' designed for secure, sandboxed file operations for AI agents. The `SKILL.md` explicitly details robust security features like sandboxed access, path validation, and permission controls, and provides best practices for secure configuration. There are no instructions for prompt injection, data exfiltration, malicious execution, or persistence within the provided files. The installation and configuration steps are for setting up the server itself, not for the agent to perform unauthorized actions. While filesystem access is a powerful capability, the documentation emphasizes a security-first design, classifying it as benign based on the provided content.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could change, move, or delete files inside the directories the user allows.

Why it was flagged

The skill intentionally exposes broad filesystem mutation and deletion tools. This is purpose-aligned, but high-impact if the user configures broad directories.

Skill content
Read, write, create, delete, move, search files and directories ... Full Access (default)
Recommendation

Configure the smallest necessary directories, prefer read-only mode when possible, and review destructive file changes before approving them.

What this means

A changed or compromised upstream npm package could affect the local filesystem server the user runs.

Why it was flagged

The skill instructs users to install or run an external npm package without a pinned version. This is normal for this integration style, but users rely on npm package provenance.

Skill content
npm install -g @modelcontextprotocol/server-filesystem ... "command": "npx", "args": ["-y", "@modelcontextprotocol/server-filesystem"
Recommendation

Verify the npm package source, consider pinning a known-good version, and install from the official project repository where possible.

What this means

If broad or sensitive folders are allowed, private files or credentials may be read by the agent during a task.

Why it was flagged

The documented search and read operations can surface secrets or private content from allowed local paths into the agent’s working context.

Skill content
Agent: "Search for files containing 'API_KEY'"
Recommendation

Do not allow home directories, credential stores, or secret-heavy folders unless necessary; use read-only access for inspection tasks and exclude sensitive paths.