Tmp.QxTMN6G9ww

WarnAudited by ClawScan on May 16, 2026.

Overview

The skill matches its Credit Karma transaction-analysis purpose, but it requires full session cookies, runs an external unreviewed MCP package, and stores sensitive financial data locally.

Review this carefully before installing. It may be useful for Credit Karma spending analysis, but only use it if you trust the external creditkarma-mcp package with your logged-in Credit Karma session and are comfortable storing detailed financial transactions on your local machine.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone or any code with access to that cookie may be able to act as the signed-in Credit Karma user until the session expires or is revoked.

Why it was flagged

The skill asks for a full signed-in Credit Karma session cookie, including refresh-capable tokens, and stores it. That is high-impact account authority and is broader than a clearly scoped read-only credential.

Skill content
Call `ck_set_session` with your Cookie header to store credentials and enable auto-refresh... CKAT carries the access + refresh JWTs
Recommendation

Only use this with code you have audited or strongly trust; prefer a scoped token if available, store the cookie securely, and rotate/sign out after use.

What this means

A changed or compromised npm package could access the user's Credit Karma session cookie or locally synced financial records.

Why it was flagged

The setup runs an external npm package without pinning a version in the example. The reviewed skill contains no MCP server code, yet that external package would receive Credit Karma session cookies and financial data.

Skill content
"command": "npx", "args": ["-y", "creditkarma-mcp"]
Recommendation

Pin and verify the package version, review the source before use, and avoid giving session cookies to unreviewed code.

What this means

Detailed financial history may remain on the device and could be read later by other local processes, backups, or future agent tasks.

Why it was flagged

The skill persists sensitive transaction history, including raw JSON, in a local database but does not document the path, retention period, encryption, access controls, or cleanup steps.

Skill content
syncs transactions into a local SQLite database... transactions (id, date, description, status, amount, account_id, category_id, merchant_id, raw_json)
Recommendation

Document and review where the database is stored, protect it with appropriate file permissions or encryption, and provide a clear deletion/cleanup procedure.

What this means

The agent may retrieve more transaction detail than the user expected if prompts are vague or broad.

Why it was flagged

The raw SQL tool is disclosed and limited to SELECT, so it is purpose-aligned, but it can still expose broad local financial data if used too broadly.

Skill content
`ck_query_sql(sql)` | Read-only SQL query against the local database (SELECT only)
Recommendation

Use specific date ranges, merchants, or categories when querying, and avoid broad SQL queries unless you intend to review the full dataset.