Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Mcp Server Scanner
v1.0.0Scans and assesses MCP servers for vulnerabilities, insecure configs, data exposure, and compliance with SOC 2, GDPR, and ISO 27001 standards.
⭐ 0· 39·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The SKILL.md describes discovery (finding MCP servers and agent configs), secret detection, network/TLS checks, and compliance mapping — tasks that normally require access to network scanning tools, host/config paths, or API credentials. Yet the skill declares no required binaries, no config paths, and no environment variables. That mismatch (claiming intrusive capabilities but requesting no explicit access) is unexplained and disproportionate.
Instruction Scope
The runtime instructions are high-level and open-ended: they tell the agent to 'run discovery and security scan' but provide no concrete, scoped commands or limits. Because the doc grants broad authority implicitly, it could lead the agent to read arbitrary config files, network endpoints, or secrets unless constrained. There are no explicit allowed paths, endpoints, or safeguards.
Install Mechanism
No install spec and no code files beyond a minimal package.json — this is instruction-only, so nothing will be downloaded or written to disk by the skill itself. That lowers direct supply-chain risk.
Credentials
The skill requests no environment variables or credentials, yet its stated behavior (detecting hardcoded secrets, mapping agent configs, assessing retention and PII exposure) would normally require access to sensitive data and possibly service credentials. The lack of declared required credentials or explicit data sources is disproportionate and unclear.
Persistence & Privilege
The skill is not always-enabled and does not request persistent system changes. It can be invoked by the agent (normal default). While autonomous invocation is allowed by default, this alone is not flagged; however, autonomous runs combined with the above ambiguities increase the risk surface.
What to consider before installing
This skill's goals (discovering MCP servers, finding hardcoded secrets, scanning configs and network) imply access to sensitive system files and network traffic, but the package declares no required credentials, binaries, or file paths and gives only vague instructions. Before installing or invoking it: 1) Ask the author for source code or a trustworthy homepage and for an explicit list of files/paths, network ranges, and credentials the skill will access. 2) Require the skill to declare required env vars and exact commands it will run, or reject it. 3) Run any scan in an isolated/test environment and with written authorization for the scope. 4) Avoid granting the agent network access or secrets without tight controls; prefer skills with verifiable provenance. If the author cannot provide clear, scoped details, treat this skill as high-risk and do not run it against production systems.Like a lobster shell, security has layers — review code before you run it.
latestvk979e9rkv8nb6z67kfnkhrkq0s83yqs3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
