mcd-cn
Analysis
This skill is a disclosed McDonald’s coupon and nutrition helper that calls a remote service with a user token; users should protect the token and confirm coupon-claiming actions.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
使用 exec 工具执行 curl 命令调用 MCP 服务
The skill relies on a local exec/curl command to call the remote API. This is central to the skill’s purpose and disclosed, but users should recognize that it uses command execution rather than a declared native integration.
自动领取所有可用优惠券到账户。
The auto-bind-coupons tool changes the user’s account coupon state by claiming all available coupons. This matches the advertised coupon-claiming purpose, but it is still an account mutation.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
用户需要在 MCP 官网注册并获取 API Token ... 设置环境变量 `MCD_TOKEN`
The skill requires a bearer token for account-specific actions. This is disclosed and expected for coupon lookup/claiming, but the token is a credential.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
MCD_URL="${MCD_MCP_URL:-https://mcp.mcd.cn}"
MCD_AUTH="Authorization: Bearer ${MCD_TOKEN:-<YOUR_TOKEN>}"Bearer-token requests are sent to the configured MCP URL. The default endpoint is disclosed, but changing MCD_MCP_URL would also change where the token is sent.
