Recruitly CRM
v1.0.0Search candidates, manage jobs, view pipelines, track billing and team performance in Recruitly CRM via MCP.
⭐ 0· 861·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the declared requirements: mcporter (an MCP client) and RECRUITLY_TOKEN are appropriate for accessing Recruitly via an MCP server.
Instruction Scope
SKILL.md only instructs the agent to configure mcporter and use the RECRUITLY_TOKEN to call MCP endpoints. It does not request unrelated files, system secrets, or external endpoints beyond the documented MCP server.
Install Mechanism
No install spec or external downloads are present (instruction-only skill). This minimizes on-disk risk; the only runtime dependency is an existing mcporter binary as declared.
Credentials
Only one environment variable (RECRUITLY_TOKEN) is required which is proportional to the stated functionality. Minor inconsistency: registry metadata lists no primary credential while SKILL.md requires RECRUITLY_TOKEN; this is a metadata omission but not a functional mismatch.
Persistence & Privilege
The skill is not set to always: true and does not request system-wide config changes. It expects the user to add an mcporter config entry, which is normal and local to mcporter.
Assessment
This skill is coherent with its purpose, but check a few things before installing: (1) Ensure you trust the mcporter binary source and have it installed from a reputable place. (2) Only provide an OAuth token (RECRUITLY_TOKEN) issued by the official MCP host (mcp.recruitly.dev); use the least-privileged token possible and rotate it if you suspect exposure. (3) The SKILL.md asks you to edit config/mcporter.json — verify that path and backup the file before modifying. (4) Note the skill can be invoked by the agent (autonomy is the platform default); if you want to restrict autonomous use, control agent permissions or only invoke the skill manually.Like a lobster shell, security has layers — review code before you run it.
latestvk9786kjycy2ekf5hhjm4hvxcm980tvkx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🎯 Clawdis
Binsmcporter
EnvRECRUITLY_TOKEN
