Skill

WarnAudited by ClawScan on May 10, 2026.

Overview

This is a legitimate-looking banking automation skill, but it gives an agent broad financial authority through an unpinned GitHub MCP server and only partly defines approval boundaries.

Install only if you intentionally want an agent to operate a Brighty banking account. Review and pin the GitHub MCP server first, use the most limited API key and account limits available, and require manual confirmation for every payment, transfer, card, account, or team-management action.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked incorrectly or too autonomously, the agent could move funds, prepare or execute batch payments, issue or change cards, or alter business account access.

Why it was flagged

The tool set includes direct money movement and business account administration. The skill does include confirmation for payout execution, but the artifacts do not clearly require explicit user approval for all other sensitive account, card, transfer, and team mutations.

Skill content
`brighty_create_external_transfer` — add fiat (IBAN) or crypto transfer to payout ... `brighty_start_payout id=UUID` — execute all transfers in batch ... `brighty_add_members emails=a@b.com,c@d.com role=ADMIN|MEMBER`
Recommendation

Require explicit user confirmation for every financial, card, account, and team-management mutation; show recipients, amounts, accounts, fees, and irreversible effects before execution; prefer spending limits and least-privilege API access where available.

What this means

Anyone or any agent process with access to the API key may be able to perform owner-authorized banking actions through the exposed tools.

Why it was flagged

The required API key is expected for this banking integration, but it represents owner-delegated authority over financial and business-account operations.

Skill content
Only the business **owner** can do this. ... All actions performed through this skill are executed on behalf of the business owner.
Recommendation

Store the API key only in the local environment, rotate it if exposed, avoid putting it in chat or memory, and use the narrowest API permissions Brighty supports.

What this means

A changed or compromised upstream GitHub package could receive the Brighty API key and perform banking actions under the user's account.

Why it was flagged

The skill runs an unpinned GitHub-hosted MCP package via npx and passes it the banking API key. The actual server code is not included in the reviewed artifacts.

Skill content
"command": "npx", "args": ["-y", "github:Maay/brighty_mcp"], "env": { "BRIGHTY_API_KEY": "${BRIGHTY_API_KEY}" }
Recommendation

Pin the dependency to a reviewed commit or release, inspect the MCP server source before use, and run it only with a restricted API key and monitored account limits.