Back to skill
Skillv1.1.1
ClawScan security
Massive Financial Connector · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousMar 5, 2026, 7:12 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill mostly does what its description says (query Massive/Polygon), but the package metadata omits required environment/binaries and the start script relies on a local 'uvx' runner that will fetch and run code from GitHub at runtime — these mismatches and the remote-execution path are concerning and worth manual review before installing.
- Guidance
- This skill appears to implement a legitimate Massive/Polygon connector, but there are three red flags you should address before installing or running it: (1) The registry metadata does not list MASSIVE_API_KEY or required binaries (curl, python3, uvx) — verify and supply only the minimal credentials needed. (2) start-mcp-server.sh calls a local uvx binary with a git+ URL which will fetch and execute code from GitHub at runtime — inspect what uvx does and manually review the GitHub repo (massive-com/mcp_massive@v0.4.0) before allowing it to run. (3) The scripts source your ~/.zshrc which can execute arbitrary shell code and expose other env variables; consider removing that line or running the scripts in a controlled environment. Recommended steps: run the scripts manually in an isolated VM/container, confirm the uvx binary's origin and behavior (or install a vetted alternative), verify the remote repo contents, and ensure your MASSIVE_API_KEY is stored and used securely (not committed or uploaded). If you cannot audit uvx and the GitHub repo, do not run the start script with network access.
Review Dimensions
- Purpose & Capability
- concernThe skill's stated purpose (Massive/Polygon market-data connector) matches the scripts which call api.massive.com endpoints. However the registry metadata declares no required env vars or binaries while SKILL.md and scripts require MASSIVE_API_KEY and expect curl, python3, and a local uvx binary. The missing declarations are incoherent with the claimed functionality.
- Instruction Scope
- concernSKILL.md instructs the agent to run the provided scripts and to start the official MCP server. The scripts source the user's ~/.zshrc (silently), read MASSIVE_API_KEY, call api.massive.com via curl, and the server script execs a local uvx binary that will fetch/run code from a GitHub repo. Sourcing ~/.zshrc can execute user dotfile content and may expose or run unexpected state; the uvx-based remote fetch potentially downloads and executes code beyond the local files.
- Install Mechanism
- concernThere is no install spec, but start-mcp-server.sh relies on an external runner ($HOME/.local/bin/uvx) invoked with a git+https://github.com/... URL which will pull code from GitHub at runtime. This is effectively a remote download-and-execute step that is not declared or constrained by an install block; whether it is safe depends entirely on the uvx tool and the remote repo's integrity.
- Credentials
- concernRequesting MASSIVE_API_KEY is appropriate for a Massive/Polygon connector, but the skill metadata omitted that requirement. The scripts also implicitly rely on curl and python3. Additionally, the scripts source ~/.zshrc which may expose other environment variables or execute arbitrary shell code — this is not justified by the stated purpose and increases risk of unintended side-effects or secret access.
- Persistence & Privilege
- okThe skill does not request always:true and does not modify global agent configuration in the provided files. There is no install spec that writes persistent system-wide artifacts in the package itself. The main privilege/risk comes from the runtime behavior (uvx fetching remote code), not from declared persistent privileges.
