Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

ToolRouter

v1.0.2

One MCP gateway to 230+ AI tools — SEO, web search, image generation, video, screenshots, security scanning, and more. Auto-provisions on first use with no A...

0· 231·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for blakefolgado/toolrouter.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "ToolRouter" (blakefolgado/toolrouter) from ClawHub.
Skill page: https://clawhub.ai/blakefolgado/toolrouter
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install toolrouter

ClawHub CLI

Package manager switcher

npx clawhub@latest install toolrouter
Security Scan
Capability signals
Requires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description align with the instructions: the SKILL.md points to a single MCP endpoint and an npm 'toolrouter-mcp' runner that would expose many tools. Modifying the OpenClaw mcpServers config is consistent with adding a gateway MCP integration.
Instruction Scope
Instructions ask the agent/user to add a toolrouter entry to ~/.openclaw/openclaw.json and optionally connect to https://api.toolrouter.com/mcp. They do not request unrelated files or secrets, but they do describe auto-provisioning (account creation and a claim URL for billing) which implies external account creation and potential transmission of identifying/billing information.
!
Install Mechanism
There is no built-in install spec, but SKILL.md directs use of 'npx -y toolrouter-mcp' which will fetch and execute code from the npm registry at runtime. Running npx executes remote package code and can be high-risk unless the npm package and publisher are verified. The skill does offer a direct remote MCP URL as an alternative, which still routes agent traffic to an external service.
Credentials
The skill declares no environment variables or credentials, which is plausible for a gateway that handles provider credentials server-side. However, the auto-provisioning/billing flow means the service will create an account and later request billing details externally — this is not represented in requires.env and is an operational privacy/billing consideration rather than a missing declared secret.
Persistence & Privilege
always is false (good). The SKILL.md instructs editing the agent's ~/.openclaw/openclaw.json to add the MCP entry — modifying the agent config is expected for MCP integrations, but the skill is marked agent-requested: true and user-invocable: false, which suggests it may be installed or activated by agent logic rather than directly by the user. That combination can lead to the agent autonomously adding a remote-executing entry without an explicit user install action.
What to consider before installing
This skill appears to do what it says (a single gateway to many tools), but it instructs the agent to fetch and run an npm package (npx -y toolrouter-mcp) and to auto-provision an account that will later ask for billing info. Before installing: verify the npm package (owner, weekly downloads, inspect source on npm/GitHub), review the toolrouter.com privacy and billing terms, prefer using the documented remote MCP URL only if you trust the service, and be cautious about letting an agent autonomously modify ~/.openclaw/openclaw.json. If you need stronger assurance, ask the maintainer for the package repository URL and inspect the code yourself (or run the MCP in an isolated environment) before allowing your agent to run it.

Like a lobster shell, security has layers — review code before you run it.

ai-agentvk97d4wp1kv712fq1b0jyd3qebd852s63gatewayvk97d4wp1kv712fq1b0jyd3qebd852s63image-generationvk97d4wp1kv712fq1b0jyd3qebd852s63latestvk97d4wp1kv712fq1b0jyd3qebd852s63mcpvk97d4wp1kv712fq1b0jyd3qebd852s63securityvk97d4wp1kv712fq1b0jyd3qebd852s63seovk97d4wp1kv712fq1b0jyd3qebd852s63toolsvk97d4wp1kv712fq1b0jyd3qebd852s63videovk97d4wp1kv712fq1b0jyd3qebd852s63web-searchvk97d4wp1kv712fq1b0jyd3qebd852s63
231downloads
0stars
3versions
Updated 1w ago
v1.0.2
MIT-0

ToolRouter

ToolRouter gives AI agents access to 230+ tools through a single MCP connection. One integration replaces managing dozens of separate provider accounts and API keys.

Install in OpenClaw

Add to ~/.openclaw/openclaw.json:

{
  "mcpServers": {
    "toolrouter": {
      "command": "npx",
      "args": ["-y", "toolrouter-mcp"]
    }
  }
}

Or paste this into OpenClaw and it sets itself up:

Add ToolRouter MCP server to my OpenClaw config at ~/.openclaw/openclaw.json. Add a "toolrouter" entry under mcpServers with command "npx" and args ["-y", "toolrouter-mcp"]. No API key needed — account auto-provisions on first use.

Restart OpenClaw. All ToolRouter tools will be available.

Remote MCP (no install)

Connect directly without npx:

https://api.toolrouter.com/mcp

How It Works

  • Auto-provisions — no API key or account setup needed. On first use it auto-creates an account and prints a claim URL to add billing details.
  • 230+ tools — SEO, web search, image generation, video, screenshots, security scanning, company lookup, flight search, social media, financial data, and more.
  • One connection — replaces managing separate accounts for dozens of providers.
  • Usage-based — free tools work immediately. Paid tools cost fractions of a cent per call.

Discover Tools

discover *              # list all available tools
discover seo            # search by category
discover screenshots    # search by keyword

Example Calls

use_tool("seo", "analyze_page", { url: "https://example.com" })
use_tool("web-search", "search", { query: "latest AI news" })
use_tool("generate-image", "text_to_image", { prompt: "a cat in space" })
use_tool("web-screenshot", "capture", { url: "https://example.com" })
use_tool("company-lookup", "get_company", { domain: "example.com" })

Links

Comments

Loading comments...