clickup-mcp
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXPOSURE]: The setup instructions guide the user to programmatically extract sensitive OAuth access tokens from a private application configuration file:
~/.claude/.credentials.json. Accessing internal application storage for credentials is a security risk as these files are not intended for external consumption. - [PROMPT_INJECTION]: This skill possesses a significant indirect prompt injection surface as it ingests untrusted data from an external source (ClickUp).
- Ingestion points: Tools such as
clickup_search,clickup_get_task,clickup_get_task_comments,clickup_get_chat_channels, andclickup_get_document_pagesread external content. - Boundary markers: None identified in the prompt templates to delimit external data from instructions.
- Capability inventory: The skill can perform write operations (create tasks, update tasks, send chat messages) based on instructions, which could be abused if malicious content is read from a task description or comment.
- Sanitization: No evidence of sanitization or filtering for the retrieved external content.
- [EXTERNAL_DOWNLOADS]: The skill is configured to communicate with the ClickUp MCP endpoint at
https://mcp.clickup.com/mcp. This is a well-known service associated with the official ClickUp platform.
Audit Metadata