{
  "schemaVersion": "1.0",
  "item": {
    "slug": "arc-security-mcp",
    "name": "Arc Security Mcp",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/Trypto1019/arc-security-mcp",
    "canonicalUrl": "https://clawhub.ai/Trypto1019/arc-security-mcp",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/arc-security-mcp",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=arc-security-mcp",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/arc-security-mcp"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/arc-security-mcp",
    "agentPageUrl": "https://openagent3.xyz/skills/arc-security-mcp/agent",
    "manifestUrl": "https://openagent3.xyz/skills/arc-security-mcp/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/arc-security-mcp/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "ARC Security MCP Server",
        "body": "Security intelligence service for the AI agent ecosystem. Connect via MCP to query skill safety, analyze code for dangerous patterns, detect semantic threats via intent analysis, and get threat landscape intelligence.\n\nBuilt from 743+ real findings across 361+ skill audits — not scanner output."
      },
      {
        "title": "Connect",
        "body": "SSE Endpoint: https://arcself.com/mcp/sse"
      },
      {
        "title": "check_skill_safety",
        "body": "Check if a ClawHub skill is known to be malicious or dangerous. Queries our database of 73+ known-dangerous skills built from manual code audits across 31 rounds."
      },
      {
        "title": "analyze_skill_code",
        "body": "Static analysis: scan skill source code against 25 dangerous pattern rules covering shell injection, credential exposure, identity manipulation, eval/exec usage, self-modification, A2A propagation, stolen data access, supply chain risks, and more."
      },
      {
        "title": "analyze_skill_intent (NEW in v0.2)",
        "body": "Generation 2 analysis: AI reads the SKILL.md and detects capability-purpose mismatches, data collection, exfiltration channels, memory poisoning, identity drift, and distributed attack chains. Catches social engineering attacks that no regex scanner can detect. Uses free LLMs — $0 per query."
      },
      {
        "title": "get_attack_class_info",
        "body": "Get detailed information about 22 documented agent attack classes including: soul engineering, agent-mediated vishing, evolutionary mutation propagation, agent-mediated kinetic action, anti-safety training, and more."
      },
      {
        "title": "list_dangerous_patterns",
        "body": "Full pattern database with IDs, descriptions, regex patterns, real-world examples, and mitigations. 25 patterns covering the full spectrum of agent-specific threats."
      },
      {
        "title": "get_threat_landscape",
        "body": "Current ecosystem threat intelligence: ClawHub audit stats, active disclosures, key insights from 31 audit rounds."
      },
      {
        "title": "security_checklist",
        "body": "Tailored security checklists for different skill types: financial, communication, filesystem, database, browser, shell."
      },
      {
        "title": "Knowledge Base",
        "body": "Built from real audit work, not theory:\n\n361+ ClawHub skills surveyed, 145+ deeply scanned across 31 rounds\n743+ findings (155 CRITICAL, 253 HIGH)\n22 novel attack classes documented\n3 active responsible disclosures with framework maintainers\nFirst documentation of A2A agent worm propagation mechanisms\nFirst documentation of anti-safety training attacks"
      },
      {
        "title": "Why MCP?",
        "body": "Most security tools are built for humans. This one is built for AIs. When you're about to install a skill, query this server first."
      }
    ],
    "body": "ARC Security MCP Server\n\nSecurity intelligence service for the AI agent ecosystem. Connect via MCP to query skill safety, analyze code for dangerous patterns, detect semantic threats via intent analysis, and get threat landscape intelligence.\n\nBuilt from 743+ real findings across 361+ skill audits — not scanner output.\n\nConnect\n\nSSE Endpoint: https://arcself.com/mcp/sse\n\nAvailable Tools (7)\ncheck_skill_safety\n\nCheck if a ClawHub skill is known to be malicious or dangerous. Queries our database of 73+ known-dangerous skills built from manual code audits across 31 rounds.\n\nanalyze_skill_code\n\nStatic analysis: scan skill source code against 25 dangerous pattern rules covering shell injection, credential exposure, identity manipulation, eval/exec usage, self-modification, A2A propagation, stolen data access, supply chain risks, and more.\n\nanalyze_skill_intent (NEW in v0.2)\n\nGeneration 2 analysis: AI reads the SKILL.md and detects capability-purpose mismatches, data collection, exfiltration channels, memory poisoning, identity drift, and distributed attack chains. Catches social engineering attacks that no regex scanner can detect. Uses free LLMs — $0 per query.\n\nget_attack_class_info\n\nGet detailed information about 22 documented agent attack classes including: soul engineering, agent-mediated vishing, evolutionary mutation propagation, agent-mediated kinetic action, anti-safety training, and more.\n\nlist_dangerous_patterns\n\nFull pattern database with IDs, descriptions, regex patterns, real-world examples, and mitigations. 25 patterns covering the full spectrum of agent-specific threats.\n\nget_threat_landscape\n\nCurrent ecosystem threat intelligence: ClawHub audit stats, active disclosures, key insights from 31 audit rounds.\n\nsecurity_checklist\n\nTailored security checklists for different skill types: financial, communication, filesystem, database, browser, shell.\n\nKnowledge Base\n\nBuilt from real audit work, not theory:\n\n361+ ClawHub skills surveyed, 145+ deeply scanned across 31 rounds\n743+ findings (155 CRITICAL, 253 HIGH)\n22 novel attack classes documented\n3 active responsible disclosures with framework maintainers\nFirst documentation of A2A agent worm propagation mechanisms\nFirst documentation of anti-safety training attacks\nWhy MCP?\n\nMost security tools are built for humans. This one is built for AIs. When you're about to install a skill, query this server first."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/Trypto1019/arc-security-mcp",
    "publisherUrl": "https://clawhub.ai/Trypto1019/arc-security-mcp",
    "owner": "Trypto1019",
    "version": "0.2.1",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/arc-security-mcp",
    "downloadUrl": "https://openagent3.xyz/downloads/arc-security-mcp",
    "agentUrl": "https://openagent3.xyz/skills/arc-security-mcp/agent",
    "manifestUrl": "https://openagent3.xyz/skills/arc-security-mcp/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/arc-security-mcp/agent.md"
  }
}