Is johnfire/openclaw-notesnook-mcp safe?
https://github.com/johnfire/openclaw-notesnook-mcp
This MCP server provides legitimate note synchronization functionality between Notesnook and OpenClaw with no significant security risks detected. While system processes accessed honeypot files during authentication, the skill itself showed no malicious behavior and all canary files remained intact.
Category Scores
Findings (3)
MEDIUM System Process Honeypot Access -15 ▶
Monitoring detected access to honeypot files (.env, SSH keys, AWS credentials), but investigation shows these were from legitimate system processes (sshd, sudo) during authentication, not from the skill itself.
LOW Node.js Runtime Dependency -20 ▶
Skill requires Node.js runtime and npm dependencies, which inherently carry standard execution risks associated with JavaScript applications.
INFO Filesystem Sync Model -10 ▶
Uses filesystem-based sync between Notesnook and OpenClaw, which requires file system access permissions but appears to be properly scoped.