Uplo Enterprise It

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill matches an enterprise IT knowledge-search purpose, but it deserves Review because it runs an unpinned external MCP package with an API key and can export broad organizational IT/security context.

Install only if you trust the UPLO tenant and the npm MCP package. Before use, pin or verify the package version, use a least-privilege API key, and avoid full organizational exports unless the user explicitly needs and approves them.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A malicious or compromised npm package update could access the user's UPLO token and the enterprise knowledge available through it.

Why it was flagged

The skill runs an unpinned npm MCP server package and passes it the UPLO API key; the reviewed artifacts do not include the package code or a pinned version.

Skill content
"command": "npx", "args": ["-y", "@agentdocs1/mcp-server", "--http"], "env": { "AGENTDOCS_URL": "${config.agentdocs_url}", "API_KEY": "${config.api_key}" }
Recommendation

Verify the npm package publisher and source, pin a specific reviewed version, and use a least-privilege UPLO token.

What this means

The agent could place a wide set of sensitive infrastructure, security, and architecture details into a conversation or report when a narrower search would be safer.

Why it was flagged

The skill exposes a broad export tool for a full organizational snapshot, but the instructions do not require explicit user confirmation, scope limits, redaction, or retention controls before use.

Skill content
"export_org_context" — Full organizational snapshot. Use when preparing comprehensive reports like architecture review documents or security posture summaries
Recommendation

Use full-context export only after explicit user approval, scope it to the minimum needed packs/classification tiers, and redact secrets or restricted security details.

What this means

The skill can access enterprise knowledge permitted by the configured UPLO token.

Why it was flagged

The skill requires a secret UPLO MCP token, which is expected for this integration but grants access according to that token's permissions.

Skill content
"api_key": { "type": "string", "required": true, "secret": true, "description": "Your UPLO MCP token" }
Recommendation

Provide a least-privilege token, rotate it if exposed, and ensure its permissions match the intended users and classification tiers.

What this means

Sensitive enterprise search queries and results may pass through the configured UPLO MCP service.

Why it was flagged

Enterprise IT queries and returned context flow through a configured MCP endpoint; this is purpose-aligned but depends on the trustworthiness and security of that endpoint.

Skill content
"mcp": { "transport": "http", "url": "${config.agentdocs_url}/mcp" }
Recommendation

Use only a trusted UPLO tenant URL, prefer HTTPS, and confirm the MCP endpoint enforces authentication and classification boundaries.

What this means

Incorrect, stale, or overly broad directives in the knowledge base could influence the agent's technical recommendations.

Why it was flagged

The skill asks the agent to incorporate retrieved organizational directives into its answers, which is expected for this purpose but makes the quality and integrity of retrieved context important.

Skill content
Then load current strategic directives — these often include active incident priorities, architecture migration mandates, or security hardening timelines that should inform your responses.
Recommendation

Verify critical operational or security recommendations against current owners, runbooks, and change-management procedures.