Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
AgentDeals
v1.0.0Search and compare 1,500+ developer infrastructure deals — free tiers, startup credits, and pricing changes across 54 categories.
⭐ 0· 34·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name/description (deal search, compare, track pricing changes) matches the included server code, data files, REST endpoints, and MCP tools (search_deals, plan_stack, compare_vendors, track_changes). The repo contains an HTTP/MCP server, OpenAPI, data/index.json and ingestion/monitoring scripts which are consistent with an aggregator service. Minor note: the registry lists "No install spec / instruction-only" while the package contains full source, package.json, and README instructions for npx/git releases — this is a documentation/packaging mismatch but not evidence of misbehavior.
Instruction Scope
SKILL.md asks the agent to connect to a remote MCP server (https://agentdeals.dev/mcp) or run the npm package locally (npx). The runtime instructions do not instruct reading unrelated local files, secrets, or scanning system state. Tools and parameters are narrowly scoped to searching/planning/comparison/tracking deals. The documentation does reference client config file locations (where to put .mcp.json) but does not require the skill to read other local configs or credentials.
Install Mechanism
No install spec is declared in the registry entry (instruction-only), yet the package includes package.json, package-lock.json, server code, and README guidance for installing via npx, GitHub releases, or platform-specific plugin installs. This is plausible (author offering hosted and local npx options) but you should verify the published npm package and release URLs before running npx or double-clicking an MCP package from an untrusted source. No suspicious remote install URLs or extract operations are present in the registry metadata.
Credentials
The skill declares no required environment variables and the SKILL.md says "No API key required." The codebase and docs mention optional env vars (PORT, BASE_URL, GOOGLE_SITE_VERIFICATION, telemetry/Upstash in changelog) for self-hosting, which is normal. No credentials or unrelated secrets are requested by the skill.
Persistence & Privilege
always:false and default agent invocation/autonomy are set (normal). The skill does not request system-wide config changes or access to other skills' configs. It's a remotely hosted service (or local npx binary) and does not ask for persistent elevated privileges in the registry metadata.
Assessment
AgentDeals appears coherent for its purpose, but before installing or pointing clients at the hosted endpoint consider: 1) If you are privacy-sensitive, understand that queries go to the remote host (agentdeals.dev) and could be logged — prefer running locally via `npx agentdeals` if you want control. 2) Verify the npm package and/or GitHub release publisher (owner identity) before running npx or double-clicking an .mcpb. 3) Review package.json scripts (if running local) to ensure no unexpected postinstall actions. 4) The skill does not request API keys or secrets, but avoid sending any sensitive data in queries to the remote server. 5) If you want stronger assurance, inspect the included source (server.ts, data files) locally and run the server in a sandbox before connecting your agent.scripts/ingest-startup-deals.ts:65
Shell command execution detected (child_process).
scripts/parse-free-for-dev.ts:125
Shell command execution detected (child_process).
test/api-client.test.ts:12
Shell command execution detected (child_process).
test/audit-stack.test.ts:90
Shell command execution detected (child_process).
test/categories.test.ts:51
Shell command execution detected (child_process).
test/costs.test.ts:86
Shell command execution detected (child_process).
test/deal-changes.test.ts:65
Shell command execution detected (child_process).
test/error-handling.test.ts:64
Shell command execution detected (child_process).
test/expiring-deals.test.ts:72
Shell command execution detected (child_process).
test/head-requests.test.ts:15
Shell command execution detected (child_process).
test/http.test.ts:13
Shell command execution detected (child_process).
test/new-offers.test.ts:74
Shell command execution detected (child_process).
test/newest-deals.test.ts:72
Shell command execution detected (child_process).
test/query-log.test.ts:12
Shell command execution detected (child_process).
test/resources.test.ts:13
Shell command execution detected (child_process).
test/search.test.ts:14
Shell command execution detected (child_process).
test/server.test.ts:43
Shell command execution detected (child_process).
test/stacks.test.ts:97
Shell command execution detected (child_process).
test/vendor-risk.test.ts:95
Shell command execution detected (child_process).
test/weekly-digest.test.ts:91
Shell command execution detected (child_process).
src/api-client.ts:5
Environment variable access combined with network send.
src/serve.ts:17
Environment variable access combined with network send.
src/stats.ts:48
Environment variable access combined with network send.
test/audit-stack.test.ts:145
Environment variable access combined with network send.
test/costs.test.ts:149
Environment variable access combined with network send.
test/expiring-deals.test.ts:127
Environment variable access combined with network send.
test/head-requests.test.ts:17
Environment variable access combined with network send.
test/http.test.ts:15
Environment variable access combined with network send.
test/new-offers.test.ts:172
Environment variable access combined with network send.
test/newest-deals.test.ts:127
Environment variable access combined with network send.
test/query-log.test.ts:14
Environment variable access combined with network send.
test/stacks.test.ts:99
Environment variable access combined with network send.
test/telemetry.test.ts:102
Environment variable access combined with network send.
test/vendor-risk.test.ts:152
Environment variable access combined with network send.
test/weekly-digest.test.ts:93
Environment variable access combined with network send.
scripts/check-pricing-changes.js:3
File read combined with network send (possible exfiltration).
scripts/ingest-startup-deals.ts:3
File read combined with network send (possible exfiltration).
scripts/monitor-pricing.js:19
File read combined with network send (possible exfiltration).
scripts/parse-free-for-dev.ts:3
File read combined with network send (possible exfiltration).
scripts/reverify.js:15
File read combined with network send (possible exfiltration).
src/serve.ts:2
File read combined with network send (possible exfiltration).
src/stats.ts:6
File read combined with network send (possible exfiltration).
test/telemetry.test.ts:3
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk975vnhatnk8yksdezdbs44jwx842cpn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
💰 Clawdis
