Starling Bank

WarnAudited by ClawScan on May 10, 2026.

Overview

This banking skill is disclosed and purpose-aligned, but it requires a Starling access token and can perform high-impact financial changes without documented confirmation or scope limits.

Only install this if you fully trust the starling-bank-mcp package and are comfortable giving an agent access to your Starling account. Use the narrowest possible token scopes, avoid enabling payment/write permissions unless necessary, require explicit confirmation for every money movement or account change, and do not store banking details in general agent memory.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent calls the wrong tool or uses wrong arguments, it could send money, remove payees, move savings funds, or lock/unlock cards.

Why it was flagged

These are high-impact financial and account-control operations, and the artifacts do not document confirmation, amount limits, payee verification, or rollback controls before the agent uses them.

Skill content
`payment_create` | Send money to a payee ... `payee_delete` | Delete a payee ... `card_lock_update` | Enable or disable (lock/unlock) a card
Recommendation

Require explicit user confirmation for every payment or account-changing action, verify payee and amount details, and prefer read-only access unless mutations are truly needed.

What this means

A broadly scoped token could allow access to sensitive banking information and account-changing actions through the MCP server.

Why it was flagged

The skill requires a bank access token capable of Starling API operations, but the provided metadata declares no primary credential or required environment variable, and the token scopes are not bounded in the artifacts.

Skill content
Requires the starling-bank-mcp npm package and a Starling personal access token ... --env STARLING_BANK_ACCESS_TOKEN="YOUR_TOKEN"
Recommendation

Use the least-privileged Starling token possible, avoid payment/write scopes unless needed, revoke the token when done, and declare the credential requirement clearly in metadata.

What this means

Banking identifiers or account details could persist beyond the current task and be reused or exposed in later sessions.

Why it was flagged

The skill instructs persistent storage of banking account details without specifying user consent, retention, minimization, encryption, or when the stored data should be deleted.

Skill content
Store account details in your memory/config for future use
Recommendation

Do not store banking details in general agent memory; if needed, store only minimal IDs in a secure user-controlled config and provide a clear deletion path.

What this means

The actual code handling the bank token and API calls is outside this review and may change if installed without a pinned version.

Why it was flagged

The skill relies on a globally installed, unpinned npm MCP server that is not included in the reviewed artifact set; this is central to the stated purpose but should be verified by the user.

Skill content
npm i -g starling-bank-mcp
Recommendation

Inspect the npm package, pin a trusted version, and install only from a verified source before providing a banking token.