Mysteel_InfoSearch

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Search terms may be visible to the Mysteel service, so sensitive business questions should not be submitted unless the user is comfortable sharing them with that provider.

Why it was flagged

The script posts the user-provided query text to an external Mysteel API endpoint. This is aligned with the stated search purpose and is not hidden, but users should understand that query text leaves the local environment.

Skill content
API_URL = "https://mcp.mysteel.com/mcp/info/ai-search/search" ... "text": text
Recommendation

Use the skill only for queries appropriate to send to Mysteel, and avoid including confidential information in search text.

What this means

Anyone who can read the local api_key.md file may be able to use the Mysteel API key, and the registry metadata does not flag a primary credential requirement.

Why it was flagged

The script reads a local API key file and sends that value as the token header to Mysteel. This is expected for an authenticated API client, but it is credential handling that users should notice.

Skill content
API_KEY_FILE = SKILL_DIR / "references" / "api_key.md" ... "token": api_key
Recommendation

Use a dedicated, least-privilege Mysteel API key, keep references/api_key.md private, do not commit it to shared repositories, and declare the credential requirement in metadata.