ScopeBlind Passport

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent access-control and audit wrapper, but installing it means trusting external npm tools to mediate MCP calls and keep local receipts and signing keys.

Install this only if you want an external npm-based gateway to wrap your MCP servers. Pin or verify the npm packages, protect the generated keys and receipts, prefer one-time approvals, and enable --enforce if you expect policies to block actions rather than only log them.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

You would be trusting the current npm versions of these packages to act as a security gateway for MCP tool calls.

Why it was flagged

The skill depends on globally installed, unpinned npm packages. This is central to the stated purpose, but the exact code installed can change over time.

Skill content
npm install -g protect-mcp@latest @scopeblind/passport@latest
Recommendation

Verify the npm/GitHub provenance before installing, and consider pinning exact package versions instead of using @latest.

#
ASI02: Tool Misuse and Exploitation
Medium
What this means

If you approve an always-allow request, a previously blocked tool could be usable for the rest of the session rather than just for one action.

Why it was flagged

The documented approval flow lets the agent call a localhost approval API after user approval, including a broader 24-hour always-allow option.

Skill content
For always-allow this tool (session-scoped, 24h TTL): curl -s -X POST http://127.0.0.1:9876/approve ... "mode":"always"
Recommendation

Use one-time approvals for specific requests unless you intentionally want a 24-hour session approval for that tool.

#
ASI06: Memory and Context Poisoning
Low
What this means

Receipts and digests may reveal what tools the agent used and when, and possibly sensitive workflow metadata depending on the underlying tool calls.

Why it was flagged

The skill intentionally creates persistent local records of agent activity for auditing.

Skill content
Shadow mode — logs every tool call with a signed receipt ... Local daily digest — human-readable summary of what your agent did
Recommendation

Store generated keys, receipts, and digest files in a protected project directory and avoid sharing receipts unless you understand what they contain.