Mcp Review
Analysis
This is a read-only MCP tool-design review skill; it may search and read project files, and it allows helper-agent use, but the artifacts show no code execution, credential access, or data mutation.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
通过 Glob 查找 `**/*server*.py` 或包含 `@mcp.tool()` 的文件 ... 审查时读取完整的 server 文件 + formatter 文件 + mock_data 文件
The skill directs the agent to search for and read multiple local project files. This is appropriate for MCP tool-definition review, but it means source and mock data may enter the review context.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
allowed-tools: Read, Glob, Grep, Agent
The skill permits use of an Agent tool. The artifacts do not require helper-agent use or show persistence/exfiltration, but delegation could pass reviewed code context to another agent.
