Clickup Project Management

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a transparent ClickUp integration, but it gives a third-party MCP server your ClickUp OAuth token and the ability to change workspace data.

Install only if you are comfortable giving the taazkareem.com MCP server access to your ClickUp workspace through OAuth. Prefer read-only or no-delete tool filters, confirm destructive changes manually, and revoke the ClickUp OAuth token if you no longer use the skill.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

66/66 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The remote server can act on your ClickUp workspace using your OAuth authorization.

Why it was flagged

The skill explicitly delegates credentialed ClickUp access to a third-party MCP server. This is disclosed and aligned with the integration, but it is high-trust account access.

Skill content
Every MCP tool call sends your license key and ClickUp OAuth token to the remote server at `clickup-mcp.taazkareem.com`.
Recommendation

Only use this if you trust the operator; consider limiting the ClickUp account/workspace scope and revoke the OAuth token if you stop using the skill.

What this means

An agent using the full tool set could create, update, move, or delete ClickUp items.

Why it was flagged

The documented tool set includes destructive ClickUp operations. This fits project management, but mistakes or overly broad agent instructions could alter or delete workspace data.

Skill content
`X-Disabled-Tools=delete_task,delete_bulk_tasks,delete_time_entry,delete_task_link,delete_list,delete_folder,delete_space_tag`
Recommendation

Use the Auditor or Safe Power User tool filters when possible, and require explicit confirmation before deletes or bulk changes.

What this means

Task names, IDs, comments, field values, and other workspace data may be processed by the third-party MCP service.

Why it was flagged

The MCP boundary is remote: workspace data and credentials are sent through an external server rather than only to ClickUp directly.

Skill content
`https://clickup-mcp.taazkareem.com/mcp` | License key, ClickUp OAuth access token, MCP tool call payloads
Recommendation

Review the provider’s repository and privacy posture before use, and avoid sending sensitive workspace content unless necessary.

What this means

You must rely on the remote MCP operator and their hosted service for correct credential handling and ClickUp actions.

Why it was flagged

The local skill package is instruction-only and does not include the remote server implementation, so this review cannot verify the server behavior directly.

Skill content
Source: unknown; Homepage: https://github.com/taazkareem/clickup-mcp-server
Recommendation

Review the linked project and operator before installing, and monitor ClickUp OAuth/app access after setup.