suspicious.exposed_secret_literal
- Location
- scripts/init-mcporter.sh:91
- Finding
- File appears to expose a hardcoded API secret or token.
AdvisoryAudited by Static analysis on May 13, 2026.
Detected: suspicious.exposed_secret_literal
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Slack's MCP server may provide usage instructions that affect tool selection and arguments during the session.
Remote MCP server instructions can influence how the agent uses tools. In context this is disclosed as tool-catalog guidance, but it should not supersede user intent or the skill's own safety rules.
The output includes the server's `Instructions:` field, if published... Treat this as the authoritative reference for the rest of the session.
Treat server instructions as tool documentation only, and ignore any instruction that conflicts with the user's request, approval requirements, or safety policies.
If misused, the agent could post or update Slack content in the connected workspace.
The skill can perform visible Slack mutations, but the same section instructs the agent to confirm clear user intent and preview the exact message or canvas update before sending.
Write-capable tools can post messages, draft or update messages, create or update canvases, and make other externally visible Slack changes in the connected workspace.
Only approve Slack writes when the channel, recipients, and exact message or canvas content are clear and intended.
Anyone who can access the relevant environment variables or local mcporter vault may be able to use the Slack integration's delegated access.
The script seeds mcporter's OAuth vault with Slack access and refresh tokens plus the client secret, giving the integration delegated access to the connected Slack workspace.
tokens: {access_token: env.mcp_access, refresh_token: env.mcp_refresh, token_type: "Bearer"}, ... {client_secret: env.mcp_client_secret}Use appropriately scoped Slack app credentials, protect the local environment and mcporter vault, and revoke or rotate the OAuth grant if access is no longer needed.
The integration's behavior depends partly on the installed mcporter package, not only on the reviewed wrapper scripts.
The skill depends on installing the external mcporter Node package. This is expected for the MCP pass-through design, but users depend on that package's provenance and updates.
"install": [{ "id": "node", "kind": "node", "package": "mcporter", "bins": ["mcporter"] }]Install from a trusted registry and consider pinning or verifying the mcporter package version in environments with stricter supply-chain requirements.