Zapier MCP

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: zapier-mcp Version: 1.0.0 The skill is suspicious due to insufficient validation of the user-provided `mcpUrl` in `reference/zapier-backend.ts`. While the URL is checked for HTTPS and a basic `tools/list` response, a malicious server could mimic Zapier's API, allowing an attacker to hijack the agent's communication with Zapier and potentially intercept or manipulate subsequent `mcporter call` requests. This represents a significant vulnerability where a user could be tricked into configuring a malicious endpoint, leading to potential compromise of agent actions or data, even though the skill itself does not exhibit explicit malicious intent.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If broad Zapier actions are exposed, an agent mistake or ambiguous instruction could change external accounts, send messages, or create business records.

Why it was flagged

The documented examples show the agent can use Zapier tools to send email, post messages, and create records/events in third-party apps.

Skill content
mcporter call zapier-mcp.gmail_send_email ... / google_sheets_create_row ... / google_calendar_create_event ...
Recommendation

Expose only the Zapier actions you actually want the agent to use, and require explicit confirmation before sending messages, creating records, or touching financial/business systems.

What this means

A mistaken or deceptive URL could register a non-Zapier MCP server under the Zapier name, letting an unexpected remote endpoint define tools and receive tool-call instructions.

Why it was flagged

The backend only enforces HTTPS and does not restrict the configured MCP server to Zapier’s documented actions.zapier.com/mcp origin.

Skill content
if (!mcpUrl.startsWith("https://")) { ... error: "MCP URL must use HTTPS" }
Recommendation

Verify the URL begins with the official Zapier MCP origin, and the implementation should restrict or clearly warn on non-Zapier MCP URLs.

What this means

Anyone who gets the MCP URL may be able to access the Zapier actions configured for that URL.

Why it was flagged

The MCP URL acts as an authentication secret for the user’s configured Zapier actions, even though registry metadata lists no primary credential.

Skill content
Zapier MCP uses a simple URL-based authentication — just paste your MCP URL and you're connected.
Recommendation

Treat the MCP URL like an API key: do not share it, avoid screenshots/logs that reveal it, and regenerate it in Zapier if exposed.