Strava MCP

AdvisoryAudited by Static analysis on May 6, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the setup command will execute code from the npm package, so the user's local environment and Strava authorization flow depend on that external package being trustworthy.

Why it was flagged

The setup guidance runs an external npm package via npx without pinning a version, and the reviewed artifact set does not include that package's code.

Skill content
`npx -y strava-mcp-unofficial setup` ... `npx -y strava-mcp-unofficial auth`
Recommendation

Verify the npm package and linked repository before running setup; consider pinning a known-good version if your MCP client configuration supports it.

What this means

If mishandled, Strava tokens or private account data could expose the user's fitness, route, or profile information.

Why it was flagged

The skill expects authentication material and private account data to be involved. This is normal for a Strava connector, but it is sensitive authority.

Skill content
Do not print OAuth tokens, API keys, service-account JSON, local token files, or private user data.
Recommendation

Authorize only the Strava account and scopes you intend to use, do not paste tokens into chats, and revoke the app's access if you no longer need it.

What this means

A connected agent may be able to retrieve private Strava activity and GPS data through the MCP server.

Why it was flagged

The skill is meant to expose Strava data through an MCP-compatible agent interface. This is purpose-aligned, but the data can include sensitive health and location information.

Skill content
Connect an MCP-compatible agent to local Strava activities, streams, routes, athlete stats, gear, and clubs.
Recommendation

Use this only with MCP clients you trust, keep location-level payloads opt-in, and run status/privacy-audit or dry-run surfaces before allowing broader access.