Aigroup Fmp Mcp
v0.1.4Use `aigroup-fmp-mcp` for listed-equity data from Financial Modeling Prep, including quotes, company profiles, statements, ratios, sector context, and calend...
⭐ 0· 142·1 current·1 all-time
byjackdark@jackdark425
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description map to the listed tool calls (quotes, profiles, statements, ratios, market snapshots). The agent dependency (mcp value: "aigroup-fmp-mcp") is consistent with a proxied Financial Modeling Prep integration.
Instruction Scope
SKILL.md only instructs the agent to confirm tickers and call specific FMP-related tool operations (get_quote, get_company_profile, etc.). It does not ask the agent to read local files, environment variables, or transmit unrelated data.
Install Mechanism
No install spec and no included code files — this is instruction-only, so nothing is written to disk or downloaded during install.
Credentials
No environment variables or credentials are requested, which is coherent if the MCP server handles FMP API credentials. As a result, you should confirm you trust the MCP server (aigroup-fmp-mcp) since credentials and network calls may be managed there rather than in the skill.
Persistence & Privilege
always is false and the skill does not request elevated or persistent privileges. The agents/openai.yaml sets allow_implicit_invocation: false, which limits implicit autonomous invocation for this interface.
Assessment
This skill appears to be a thin instruction wrapper for an MCP-backed Financial Modeling Prep integration and is internally consistent. Before installing, verify you trust the MCP server named "aigroup-fmp-mcp" (check the GitHub homepage and the server implementation) because API keys and network requests may be handled by that server rather than the skill. Also confirm your platform enforces the declared allow_implicit_invocation: false and that no secret (FMP API key) needs to be provided to the agent in your environment. If you cannot audit the MCP service, treat it like an external data provider and limit its access to only non-sensitive queries.Like a lobster shell, security has layers — review code before you run it.
latestvk979mzy4jcs2rtzv22rk0mq2b983e8qx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
