Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

GLM MCP Server Use

v1.0.2

GLM MCP Server Use for OpenClaw. Configure and use the 4 official Z.AI / GLM MCP servers (vision, web search, web reader, zread) with environment-variable AP...

0· 84·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The skill claims to configure and use Z.AI GLM MCP servers, which legitimately requires a Z.AI API key and tooling like mcporter, Python, and Node/npm. However the registry metadata incorrectly lists no required env vars, no primary credential, and no required binaries, while the shipped scripts clearly read API key env vars and call external binaries (mcporter, npx, python3). This mismatch between declared requirements and actual needs is a material inconsistency.
Instruction Scope
SKILL.md and the scripts stay within the stated purpose: generating a mcporter config, inspecting schemas, and performing smoke tests against api.z.ai endpoints. However the runtime steps store the API key in a generated mcporter config file (plain text Authorization header), run subprocesses, and call npx -y @z_ai/mcp-server (which will fetch/execute remote npm code). The scripts also run mcporter calls that will fetch arbitrary URLs (web-reader) and may write a smoke-test report to disk.
Install Mechanism
There is no formal install spec (instruction-only), which is low friction. But the vision MCP entry uses 'npx -y @z_ai/mcp-server' which downloads and runs code from the npm registry at runtime — a remote code fetch that increases risk compared with a bundled, reviewed package. No installer network URL or obscure hosts are present in the skill itself.
!
Credentials
The scripts require an API key (they probe Z_AI_API_KEY, ZAI_API_KEY, GLM_API_KEY, ZHIPU_API_KEY) and then embed that key into the mcporter config as an Authorization Bearer header. Requesting a Z.AI-style key is proportionate to the purpose, but the published metadata failing to declare the required credential and failing to document that the API key will be written to disk is an important omission. No other unrelated secrets are requested.
Persistence & Privilege
The skill is not force-installed (always:false) and does not alter other skills. It does persist state: it writes a mcporter config file (default ./tmp/mcporter-glm.json) that includes the Authorization header with your API key, and it writes a smoke test report to disk. That means your secret may be stored in plaintext on the filesystem unless you choose a different path or remove the file.
What to consider before installing
This skill appears to do what it says, but there are practical and disclosure concerns you should consider before installing: - Metadata mismatch: The skill's published metadata does not list required env vars or binaries, but the scripts require a Z.AI-style API key and external tools (mcporter, python3, Node/npm, and optionally Pillow for the vision test). Assume you must have these installed. - Secret persistence: setup_glm_mcp_servers.py embeds your API key into the mcporter config file (defaults to ./tmp/mcporter-glm.json). That file contains a Bearer token header in plaintext. If you install/run this, either point --config to a safe path, delete the generated file after use, or use a limited-scope API key. - Remote code download: The vision entry uses 'npx -y @z_ai/mcp-server' which will pull and execute code from the npm registry at runtime. If you require stricter controls, review the @z_ai/mcp-server package source (and its version) before allowing npx to run. - Network calls: The smoke test and normal use will make requests to api.z.ai endpoints and to whatever URLs you pass to the web-reader; don't feed sensitive internal URLs unless you intend to expose them to Z.AI. - Recommended mitigations: run in an isolated environment (container or dedicated VM), inspect the generated mcporter config before running calls, use a limited/replaceable API key, and confirm you have the expected tooling (mcporter, Node >=22 for @z_ai/mcp-server, python3 and Pillow). Also ask the publisher to correct the registry metadata to declare required env vars and binaries so future reviewers aren't surprised. Given these issues the skill is coherent with its stated purpose but the omissions and secret persistence are meaningful risks — proceed only after you review and mitigate them.

Like a lobster shell, security has layers — review code before you run it.

glmvk97fdfx95de04phna65p90yme184kzmcglm-mcp-server-usevk97fdfx95de04phna65p90yme184kzmclatestvk97fdfx95de04phna65p90yme184kzmcmcpvk97fdfx95de04phna65p90yme184kzmcopenclawvk97fdfx95de04phna65p90yme184kzmcvisionvk97fdfx95de04phna65p90yme184kzmcweb-readervk97fdfx95de04phna65p90yme184kzmcweb-searchvk97fdfx95de04phna65p90yme184kzmcz-aivk97fdfx95de04phna65p90yme184kzmczreadvk97fdfx95de04phna65p90yme184kzmc

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments