AnyShare MCP Skills

PassAudited by VirusTotal on May 9, 2026.

Overview

Type: OpenClaw Skill Name: anyshare-mcp-skills Version: 0.2.8 The skill bundle provides instructions for an AI agent to integrate with AnyShare via the Model Context Protocol (MCP). It is classified as suspicious because it instructs the agent to perform high-risk operations, including executing shell commands (e.g., mkdir, cat, mcporter) and modifying local configuration files (~/.mcporter/mcporter.json and ~/.openclaw/openclaw.json) to store authentication tokens and adjust system timeouts. While these actions are aligned with the stated purpose of configuring the AnyShare MCP integration, the requirement for the agent to modify its own environment and handle Bearer tokens via direct file manipulation constitutes a significant risky capability. The instructions in SKILL.md do include mandatory user confirmation steps (C3, C4) for sensitive operations, which mitigates but does not eliminate the risk associated with these broad permissions.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the conversation log or local config is exposed, someone else could use the token to access or modify AnyShare documents within the user's permissions.

Why it was flagged

The workflow asks the user to paste an AnyShare access token into the chat and then persists it in a local config file. This is authentication-related and purpose-aligned, but the token can grant enterprise document access and SECURITY.md separately warns not to paste tokens into chat logs.

Skill content
复制令牌后,**在本对话中粘贴**。 ... Agent 将 `~/.mcporter/mcporter.json` 中 `asmcp.headers.Authorization` 更新为
Recommendation

Avoid pasting real tokens into chat. Prefer a secret store, environment variable, OAuth/device flow, or manual local config editing; use least-privilege tokens and revoke them when no longer needed.

What this means

The agent may alter local configuration and daemon behavior in a way the user has not explicitly reviewed.

Why it was flagged

The skill directs the agent to make persistent local MCP/OpenClaw configuration changes before an explicit user approval step. These changes support the skill, but they affect the user's runtime environment.

Skill content
用户首次使用本技能时,Agent 必须直接执行以下步骤,不要先问用户"要不要配置"。 ... 写入 `~/.mcporter/mcporter.json` ... 读取 `~/.openclaw/openclaw.json`
Recommendation

Ask for confirmation before writing files or restarting daemons, show the exact config diff, and confirm the enterprise MCP endpoint before persisting it.

What this means

Users may not realize they need a trusted mcporter installation before the skill can operate.

Why it was flagged

The skill itself declares a mcporter dependency, while the registry requirements shown to the reviewer list no required binaries. This is a packaging/declaration gap rather than evidence of malicious behavior.

Skill content
metadata: '{"openclaw":{"category":"productivity","emoji":"📁","requires":{"bins":["mcporter"]},"openclawSkillsEntryFile":"openclaw.skill-entry.json"}}'
Recommendation

Ensure mcporter is installed from a trusted source and update registry metadata so dependency requirements are clear.

What this means

Search, upload, download, and writing requests may be sent to the configured AnyShare MCP service using the user's token.

Why it was flagged

The skill routes authenticated operations through an AnyShare MCP endpoint. This is expected for the integration, but the endpoint receives privileged document operations.

Skill content
"url": "https://anyshare.aishu.cn/asmcp", ... "headers": { "Authorization": "Bearer <token>" }
Recommendation

Verify the MCP URL is your organization's official endpoint and that use complies with enterprise data-handling policy.