openamc-mcp

v1.0.1

OpenAMC 本地 MCP 命令调用技能。通过标准化 CLI 接口,允许 AI Agent 主动向本地 MCP Server 发送查询指令以获取全球金融数据。覆盖 A股/港股(AKShare)、美股(yfinance)、宏观经济(FRED/IMF/EconDB)、美国国会(Congress)及衍生品、外汇、大宗...

0· 491·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
SKILL.md clearly describes a local MCP CLI-based connector that requires the `mcp` command and a local MCP server at http://127.0.0.1:8001. However the registry metadata at the top of the submission lists no required binaries or credentials while _meta.json includes an explicit handler (/usr/local/bin/mcp) and entrypoint pointing to the local MCP URL. The lack of a declared required-binaries entry in registry metadata is inconsistent with the skill's stated dependency on `mcp` and is disproportionate to its claimed purpose.
Instruction Scope
The SKILL.md instructions are narrowly scoped: they instruct the agent to run local `mcp call openamc ...` commands against a local MCP server to fetch financial data. That aligns with the stated purpose and does not instruct reading arbitrary host files or exfiltrating data. However the instructions give wide latitude to call many functions (193 tools) on the MCP server; the actual behavior depends on that server's implementation, which is not included.
Install Mechanism
This is an instruction-only skill with no install spec and no code files, so it does not itself write code to disk or download artifacts. That lowers install risk. The remaining risk depends on the external `mcp` binary and the MCP server implementation (both outside this package).
Credentials
The skill does not request environment variables or credentials in SKILL.md, and no secrets are required by the instruction text. This is proportionate to a local-data-query connector. However, the absence of declared env requirements contrasts with _meta.json's listed permissions (network, messaging), so verify that no external credentials will be requested by the local MCP server or `mcp` binary.
!
Persistence & Privilege
_meta.json lists 'permissions': ["network","messaging"] and includes an entrypoint and handler pointing to a local binary and URL. Although the skill itself does not request always:true or persistent config writes, the presence of network/messaging permissions in metadata (not visible in SKILL.md) is an elevated privilege claim and is inconsistent with the instruction-only surface. Also there are mismatches across manifest fields (ownerId and version differ from registry metadata), which raises provenance concerns about what the skill might be allowed to do if installed.
What to consider before installing
This skill appears to be an instruction-only connector that calls a local MCP server via the `mcp` CLI to fetch financial data — that is consistent with its description. However there are several mismatches in the package that you should resolve before installing: - Confirm the source and provenance: the package has no homepage and the ownerId/version in _meta.json do not match the registry metadata. Ask the publisher to provide a canonical source (homepage, repository, signed release) and explain the owner/version discrepancy. - Verify the `mcp` binary and MCP server: SKILL.md requires a locally installed `mcp` command and a server at http://127.0.0.1:8001. Ensure you trust the `mcp` binary (where it came from) and that the MCP server implementation is safe. The skill will call whatever functions that server exposes. - Confirm permissions: _meta.json claims network and messaging permissions. Check whether the MCP server or `mcp` client will make outbound network calls beyond localhost or require credentials. If you do not want external network access, run the MCP server in an isolated environment and audit `mcp`'s behavior first. - Test in a sandbox: before granting this to a production agent, run sample `mcp call openamc ...` commands manually on an isolated machine to observe what data is fetched and where traffic goes. - Ask for missing details: request the publisher provide the `mcp` binary source, MCP server code or API spec, and a clear statement of required permissions. If these are not available or the publisher cannot explain the manifest mismatches, treat the skill as untrusted. What would change this assessment: if the publisher supplies a verifiable repository or homepage, a signed release for the `mcp` binary, and an explicit manifest that consistently declares the required binary and permissions, this would move the assessment toward benign.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bg9nsx6z9t6csadvq39qc2981sg0g

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments