甩手店长一键采集,刊登

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is a coherent ecommerce automation client, but it has high-impact authority to store access credentials, call arbitrary MCP tools, and publish products to shops without clearly bounded safeguards.

Review this skill carefully before installing. It is not shown to be malicious, but it can control live ecommerce workflows: logging in, collecting products, claiming drafts, and publishing to shops. Use a limited app key if possible, confirm shop IDs and product details before publishing, and remove the saved authorization file if you no longer want the skill to retain access.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could call tools beyond the specific action the user intended, especially if the remote server adds new tools or if a broad request is interpreted too aggressively.

Why it was flagged

The skill is not limited to a fixed, reviewed workflow; it intentionally exposes arbitrary current and future remote MCP tools, including account-changing tools such as login, collect, claim, and publish.

Skill content
This wrapper is expected to expose **all current tools** ... If new tools are added server-side later, use `tools` to discover them and call them via `call`.
Recommendation

Use an explicit allowlist for safe tools, require user confirmation for mutating actions, and document the scope and expected effects of every callable MCP tool.

What this means

A wrong URL, shop ID, or product draft could be published immediately to a live storefront, potentially causing business, policy, or reputation issues.

Why it was flagged

A single command can move a product URL through collection, draft claiming, and immediate public publishing, while default settings ignore sensitive-word rules.

Skill content
`collect_and_publish` ... 此命令执行:采集 → 认领 → 查询草稿 → 发布 ... `bindWordRule=IGNORE` - 忽略敏感词直接发布 ... `scheduledPublish=false` - 立即发布
Recommendation

Default to draft-only behavior, require explicit confirmation before publishing, show the target shop and item details before mutation, and avoid ignoring sensitive-word checks unless the user explicitly requests it.

What this means

The service credential can remain on disk and be reused by later runs or accessed by other local processes/users if file permissions are weak.

Why it was flagged

The script prompts for an app key or authorization header and saves it persistently in the user's home directory.

Skill content
return path.join(os.homedir(), ".htyd-mcp-client-streamable.json"); ... rl.question("MCP AppKey/Authorization not set. Please input MCP_APP_KEY ...") ... safeWriteJson(configPath, { ...cfg, authorization });
Recommendation

Clearly declare the credential requirement, document where it is stored, use restrictive file permissions or a system secret store, and provide a logout/remove-credential command.

What this means

Product URLs, shop identifiers, publish actions, and credentials are handled through the remote MCP service.

Why it was flagged

The skill communicates with a remote MCP endpoint and sends authorization and business workflow requests there. This is expected for the integration, but users should understand the data path.

Skill content
Default endpoint: `MCP_URL=https://dz.shuaishou.com/mcp` ... `MCP_APP_KEY=<your_app_key>` (sent as `Authorization: Bearer ...`)
Recommendation

Verify that the endpoint and publisher are trusted, use the least-privileged app key available, and avoid sending unrelated sensitive data through this MCP connection.

What this means

Users have less external information for verifying who maintains the skill or auditing changes before trusting it with store operations.

Why it was flagged

The artifacts do not provide a public source repository or homepage for provenance, which matters more because the skill can operate on production ecommerce accounts.

Skill content
Source: unknown; Homepage: none
Recommendation

Install only if you trust the publisher and the MCP endpoint; prefer a version with a documented source repository, changelog, and credential/security guidance.