Env credential access
- Finding
- Environment variable access combined with network send.
Security checks across static analysis, malware telemetry, and agentic risk
The skill appears purpose-aligned for searching and inspecting Substreams packages, with normal cautions around running an npm MCP server, fetching user-supplied URLs, and optionally exposing an HTTP/SSE endpoint.
This skill looks reasonable for its purpose. Before installing, verify the npm package source, prefer local stdio or localhost HTTP mode, avoid exposing the SSE endpoint publicly, pass only trusted .spkg URLs, and review any generated sink deployment commands before running them.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Installing runs third-party package code on the user's machine.
The skill asks users to execute an npm package via npx. That is coherent for an MCP server, but it means installation depends on the published package and npm dependency chain.
## Install ```bash npx substreams-search-mcp ```
Verify the npm package/repository before use and prefer pinned or reviewed versions for sensitive environments.
If exposed to untrusted callers, the server could be made to fetch unexpected URLs.
Package inspection fetches a caller-supplied URL. This is expected for inspecting .spkg files, but it is still an outbound request capability controlled by tool input.
return await fetchSubstream(url, { signal: controller.signal });Use trusted .spkg URLs and do not expose the MCP server to untrusted clients without access controls.
A malicious package description could contain text that attempts to influence the agent if the agent treats returned documentation as instructions.
The tool returns documentation and metadata from external Substreams packages into the agent context. That content is purpose-aligned but untrusted.
doc: pkg.packageMeta[0].doc || undefined
Treat package docs and metadata as data, not instructions, and review any generated commands before acting on them.
If the SSE endpoint is exposed beyond a trusted local environment, other clients may be able to invoke the tools.
The skill can run an HTTP/SSE MCP endpoint for remote agents. The documentation does not describe authentication, though the example uses localhost.
Supports **dual transport** — stdio for local clients and SSE/HTTP for remote agents
Keep the endpoint bound to localhost or protect it with network-level access controls when using HTTP/SSE mode.