Mcp Client

ReviewAudited by ClawScan on May 1, 2026.

Overview

This appears to be a straightforward MCP client, but it should only be used with trusted MCP servers because it can invoke server tools, read server resources, and send an API key to the chosen endpoint.

This skill is not showing hidden or malicious behavior in the provided artifacts. Before installing, make sure you only use MCP servers you trust, inspect available tools/resources before invoking them, avoid sending API keys to unknown URLs, and treat server-provided prompts/resources as untrusted content unless the server is under your control.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If connected to a server exposing high-impact tools, the agent could trigger those server-side actions when asked to call them.

Why it was flagged

The client can invoke any caller-supplied MCP tool name with caller-supplied arguments on the configured server. This is the intended purpose, but it is a powerful generic action channel.

Skill content
data = {"tool": tool_name, "arguments": ...}; resp = self.session.post(f"{self.server_url}/mcp/call", json=data)
Recommendation

Only connect to trusted MCP servers, inspect available tools first, and require explicit user approval before invoking tools that change data or affect accounts.

What this means

A key entered for the wrong or untrusted server could give that server access to the credential.

Why it was flagged

The skill supports sending a user-provided bearer API key to the configured MCP server. This is expected for authenticated MCP use, but it is sensitive authority.

Skill content
if api_key:
    self.session.headers["Authorization"] = f"Bearer {api_key}"
Recommendation

Use least-privilege, per-server API keys and prefer HTTPS endpoints you control or trust.

What this means

A malicious or mistaken MCP server could provide misleading tools, resources, or prompts, or receive credentials intended for another server.

Why it was flagged

The client can be pointed at arbitrary MCP endpoints, so trust, identity, and data boundaries depend on the selected server.

Skill content
parent_parser.add_argument("--server-url", default=DEFAULT_MCP_SERVER, help="MCP Server URL")
Recommendation

Use known MCP server URLs, verify server identity, and treat returned resources/prompts as untrusted unless the server is trusted.

What this means

Untrusted MCP prompt templates could influence the agent’s next steps or recommendations.

Why it was flagged

The skill explicitly supports MCP-provided prompt templates. If an agent treats remote prompt content as authoritative, it could steer behavior.

Skill content
- **Prompt Templates** - Use structured prompts from MCP servers
Recommendation

Review server-provided prompts and do not let them override user, system, or safety instructions.

What this means

Different package versions or an untrusted package source could affect behavior.

Why it was flagged

The setup instructions rely on installing the requests package without a pinned version. This is common and purpose-aligned, but it leaves dependency version/provenance to the user environment.

Skill content
pip install requests
Recommendation

Install dependencies from a trusted package index and consider pinning versions in controlled environments.