Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Volkern MCP Server

v1.1.1

Automate Volkern CRM operations including lead management, appointment scheduling, task tracking, service catalog, WhatsApp messaging, sales pipeline, quotat...

0· 104·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
Name/description match the included code: this is an MCP server that calls Volkern's REST API. However the registry metadata claims no required environment variables or binaries, while the SKILL.md and the bundled code both require a VOLKERN_API_KEY (and optionally VOLKERN_API_URL). That mismatch between declared requirements and actual runtime requirements is an incoherence to investigate.
Instruction Scope
The SKILL.md instructions and the code are scoped to CRM operations (leads, appointments, tasks, catalog, WhatsApp messaging) and describe using an API key and the Volkern API endpoints. The instructions do not ask the agent to read unrelated files or access unrelated services.
Install Mechanism
Registry lists no install spec (instruction-only), but the package includes source, dist, and package.json (with a bin), and the README documents npm installation. There is no external arbitrary download URL in the manifest. The inconsistency (no install spec vs present packaged code and README install steps) is noteworthy but not itself malicious.
!
Credentials
The skill logically needs a single Volkern API key (VOLKERN_API_KEY) — that is proportionate to its purpose. However the manifest/registry metadata does not declare this required credential (contradicted by SKILL.md and by src/dist code that exits if the key is missing). The omission of the required secret in registry metadata is an integrity/visibility issue and raises suspicion.
Persistence & Privilege
The skill does not request always: true, does not modify other skills, and does not ask for system-wide configuration changes. It runs as a separate MCP server process and will make network requests to the Volkern API (expected for its purpose).
What to consider before installing
This package looks like a legitimate MCP server for Volkern CRM, but there are important inconsistencies you should resolve before installing or running it: - Verify the source: the registry entry lacks a homepage and has an unknown owner ID. Prefer installing only from an official Volkern release (official website or the GitHub repository referenced in package.json). - The code and SKILL.md require a VOLKERN_API_KEY (and optionally VOLKERN_API_URL). The registry metadata omitted this — treat that as a red flag and confirm the key requirement explicitly. - If you proceed, create an API key with the minimal permissions needed (only the scopes listed in SKILL.md) and rotate it if you stop using the skill. - Review package.json and the included dist/index.js yourself (or have someone you trust review it) to ensure there are no hidden network endpoints or unexpected behaviors beyond calling the configured VOLKERN_API_URL. - Run the MCP server in a sandboxed environment or limited container (network egress rules, no sensitive host mounts) first to observe behavior, and monitor outbound connections (it defaults to https://volkern.app/api). - If you need higher assurance, request the upstream repository URL or an official vendor statement confirming this release and that the registry metadata should declare the VOLKERN_API_KEY requirement. Because the functionality itself matches the description but the manifest/metadata omissions and packaging-to-install inconsistencies are concerning, treat this skill cautiously until provenance and required environment variables are confirmed.
dist/index.js:8
Environment variable access combined with network send.
src/index.ts:15
Environment variable access combined with network send.
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk970r2nnwppsw5m89hv56gr14s8350mc

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments