Quickbooks mcp

AdvisoryAudited by Static analysis on May 5, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You cannot verify from these artifacts which QuickBooks server or tools will receive OAuth-backed financial requests.

Why it was flagged

The reviewed package does not include the MCP manifest, endpoint details, or tool schemas for the QuickBooks provider, yet it still points the agent to runtime QuickBooks tools.

Skill content
no skill-local `mcporter.json` is registered for QuickBooks yet... In current runtime, inspect the available QuickBooks tools first
Recommendation

Use only after the QuickBooks MCP manifest/provider endpoint and tool schemas are registered and reviewed; verify provider provenance before granting production QuickBooks access.

What this means

Sensitive accounting data may flow to a runtime provider that is not reviewable from this package alone.

Why it was flagged

The data flow names an active tool provider but the reviewed artifacts do not identify that provider, its endpoint, or its permission boundary.

Skill content
Runtime tool calls, if present in the active OpenClaw environment, use Maverick-provisioned OAuth credentials and expose QuickBooks customer, invoice, payment, expense, vendor, and report data to the active tool provider.
Recommendation

Confirm the active QuickBooks provider identity, OAuth scopes, logging/retention behavior, and tool permissions before using the skill with real company books.

What this means

Anyone with access to the local mcporter credentials vault may be able to use the stored QuickBooks authorization.

Why it was flagged

The initializer persists QuickBooks OAuth access and refresh tokens in mcporter's local credentials vault, which is expected for OAuth MCP operation but is sensitive credential material.

Skill content
mcp_vault="${HOME}/.mcporter/credentials.json" ... tokens: {access_token: env.mcp_access, refresh_token: env.mcp_refresh, token_type: "Bearer"}
Recommendation

Protect the host account and ~/.mcporter directory, use least-privilege QuickBooks scopes where available, and revoke the integration if the environment is no longer trusted.

What this means

Mistaken or overbroad tool use could alter invoices, payments, expenses, vendors, or accounting records.

Why it was flagged

The skill explicitly supports high-impact accounting mutations but also discloses the risk and requires user confirmation.

Skill content
Write operations that create, update, delete, send, void, or sync customers, invoices, payments, expenses, vendors, and accounting records can affect financial books. Confirm clear user intent before invoking write tools
Recommendation

Keep the skill in read-only use unless a specific write is requested; review current records and confirm exact changes before allowing writes.

What this means

A future mcporter package change could affect how this skill runs or handles credentials.

Why it was flagged

The dependency is purpose-aligned and the skill discloses it, but installing the latest unpinned package leaves behavior dependent on future npm releases.

Skill content
Auto-installed via `npm install -g --ignore-scripts mcporter`... The install spec uses unpinned `mcporter` (npm `latest`)
Recommendation

Pin mcporter to a reviewed version in controlled environments.