AgentKey — Full internet access for your AI agent

ReviewAudited by ClawScan on May 10, 2026.

Overview

AgentKey is aligned with its web/MCP integration purpose, but it should be reviewed because it can run remote setup/update commands, store an API key in agent configs, and enable future auto-updates.

Install only if you trust AgentKey, `@agentkey/mcp`, and the `chainbase-labs/agentkey` update channel. Review or manually run the setup command, understand where the API key will be stored, avoid sending confidential data through the MCP tools, and do not enable auto-upgrade unless you are comfortable with future updates being installed automatically.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may try to run a remote installer/auth command and change local agent configuration when the user only asked for a web/data query.

Why it was flagged

A normal query can be routed into a shell-executed setup/auth flow that modifies MCP configuration, without a clearly stated confirmation step in the visible setup workflow.

Skill content
If any are missing → Setup (regardless of what the user asked). ... Install / re-auth in one shot — run this in the user's shell: `! npx -y @agentkey/mcp --auth-login`
Recommendation

Require explicit user confirmation before running setup or re-auth commands, and prefer running the setup command manually after reviewing it.

What this means

If the referenced package, registry entry, or update channel is compromised or changed unexpectedly, the agent could execute altered code that affects local configuration or credentials.

Why it was flagged

Setup and upgrade pull executable packages/skill updates by name without pinned versions or checksums; combined with the unknown source/homepage and no install spec, provenance is not easy to verify.

Skill content
`npx -y @agentkey/mcp --auth-login` ... `npx skills update chainbase-labs/agentkey`
Recommendation

Install only if you trust AgentKey and the referenced package/update source; avoid auto-updates unless you are comfortable receiving unreviewed future changes.

What this means

Processes or users that can read those config files may be able to obtain the AgentKey API key or use the configured MCP server.

Why it was flagged

The integration stores an AgentKey API key in local agent configuration so the MCP server can authenticate. This is expected for the service, but it is sensitive delegated access.

Skill content
Writes the MCP server entry (with the key as an env var) into known config files: Claude Code → `~/.claude/settings.json` ... Cursor → `~/.cursor/mcp.json`
Recommendation

Use a revocable/least-privilege key if available, restrict file permissions, and revoke/remove the key when uninstalling or if the machine is shared.

What this means

After opting in, future uses of the skill can update AgentKey automatically instead of asking each time.

Why it was flagged

A persistent opt-in file changes future behavior so updates can run without another prompt. It is disclosed and includes an undo path, but it extends agent behavior across sessions.

Skill content
`Always keep me up to date` → ... `touch .../agentkey/auto-upgrade` ... "future AgentKey updates install automatically"
Recommendation

Do not enable auto-upgrade unless you trust the update channel; remove `~/.config/agentkey/auto-upgrade` to disable it.

What this means

Search terms, URLs, scrape targets, and other parameters may be sent to AgentKey's service.

Why it was flagged

Queries, URLs, and tool parameters are routed through an external MCP provider. This is purpose-aligned, but users should understand the data boundary.

Skill content
The skill is useless without the AgentKey MCP server registered ... `execute_tool` | Execute any tool by name + params. All calls go through this.
Recommendation

Avoid sending secrets, private URLs, or confidential business data unless you intend to share them with the provider and have reviewed its privacy/security terms.