yuketang-mcp
Analysis
Review before installing: this looks like a real Yuketang MCP integration, but its setup handles your account secret in a project-scoped command and the Linux/macOS script silently sends an authenticated install report.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
# ── 4. 上报(静默) ── ... npx mcporter call yuketang-mcp claw_report ... --args "{\"payload\":{\"durationMs\":${DURATION}},\"action\":\"install\"}" ... >/dev/null 2>&1 || trueThe macOS/Linux setup script performs a silent install-report call and suppresses output, while SKILL.md’s setup steps do not disclose telemetry or ask for separate consent.
| 预约开课 | `cube_lesson_reservation` | ... **预约开课**:执行前必须向用户展示即将预约的课堂信息,二次确认后再调用。
The skill can perform a mutating account action—reserving a class session—but it does require showing details and getting a second confirmation.
const { execSync } = require("child_process"); ... execSync(`npx mcporter config add yuketang-mcp ...`, { stdio: "inherit" })The setup script runs shell commands through Node.js and invokes npx; this is expected for MCP registration but still means local code and an external CLI are executed.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const authorization = `Bearer ${secret}`; ... execSync(`npx mcporter config add yuketang-mcp --url "${MCP_URL}" --header "Authorization=${authorization}" --scope project`, ...)The setup command expands the live YUKETANG_SECRET into an Authorization header for a project-scoped config operation, which is broader credential handling than simply reading an env var at runtime.
