@borye

Xiaohongshu (小红书) Automation

Automate Xiaohongshu (RedNote) content operations using a Python client for the xiaohongshu-mcp server. Use for: (1) Publishing image, text, and video content, (2) Searching for notes and trends, (3) Analyzing post details and comments, (4) Managing user profiles and content feeds. Triggers: xiaohongshu automation, rednote content, publish to xiaohongshu, xiaohongshu search, social media management.

当前版本
v1.0.0
150 3.1万总安装 306

name: xiaohongshu-mcp description: > Automate Xiaohongshu (RedNote) content operations using a Python client for the xiaohongshu-mcp server. Use for: (1) Publishing image, text, and video content, (2) Searching for notes and trends, (3) Analyzing post details and comments, (4) Managing user profiles and content feeds. Triggers: xiaohongshu automation, rednote content, publish to xiaohongshu, xiaohongshu search, social media management.

Xiaohongshu MCP Skill (with Python Client)

Automate content operations on Xiaohongshu (小红书) using a bundled Python script that interacts with the xpzouying/xiaohongshu-mcp server (8.4k+ stars).

Project: xpzouying/xiaohongshu-mcp

1. Local Server Setup

This skill requires the xiaohongshu-mcp server to be running on your local machine.

Step 1: Download Binaries

Download the appropriate binaries for your system from the GitHub Releases page.

PlatformMCP ServerLogin Tool
macOS (Apple Silicon)xiaohongshu-mcp-darwin-arm64xiaohongshu-login-darwin-arm64
macOS (Intel)xiaohongshu-mcp-darwin-amd64xiaohongshu-login-darwin-amd64
Windowsxiaohongshu-mcp-windows-amd64.exexiaohongshu-login-windows-amd64.exe
Linuxxiaohongshu-mcp-linux-amd64xiaohongshu-login-linux-amd64

Grant execute permission to the downloaded files:

chmod +x xiaohongshu-mcp-darwin-arm64 xiaohongshu-login-darwin-arm64

Step 2: Login (First Time Only)

Run the login tool. It will open a browser window with a QR code. Scan it with your Xiaohongshu mobile app.

./xiaohongshu-login-darwin-arm64

Important: Do not log into the same Xiaohongshu account on any other web browser, as this will invalidate the server's session.

Step 3: Start the MCP Server

Run the MCP server in a separate terminal window. It will run in the background.

# Run in headless mode (recommended)
./xiaohongshu-mcp-darwin-arm64

# Or, run with a visible browser for debugging
./xiaohongshu-mcp-darwin-arm64 -headless=false

The server will be available at http://localhost:18060.

2. Using the Skill

This skill includes a Python client (scripts/xhs_client.py) to interact with the local server. You can use it directly from the shell.

Available Commands

CommandDescriptionExample
statusCheck login statuspython scripts/xhs_client.py status
search <keyword>Search for notespython scripts/xhs_client.py search "咖啡"
detail <id> <token>Get note detailspython scripts/xhs_client.py detail "note_id" "xsec_token"
feedsGet recommended feedpython scripts/xhs_client.py feeds
publish <title> <content> <images>Publish a notepython scripts/xhs_client.py publish "Title" "Content" "url1,url2"

Example Workflow: Market Research

  1. Check Status: First, ensure the server is running and you are logged in.

    python ~/clawd/skills/xiaohongshu-mcp/scripts/xhs_client.py status
    
  2. Search for a Keyword: Find notes related to your research topic. The output will include the feed_id and xsec_token needed for the next step.

    python ~/clawd/skills/xiaohongshu-mcp/scripts/xhs_client.py search "户外电源"
    
  3. Get Note Details: Use the feed_id and xsec_token from the search results to get the full content and comments of a specific note.

    python ~/clawd/skills/xiaohongshu-mcp/scripts/xhs_client.py detail "64f1a2b3c4d5e6f7a8b9c0d1" "security_token_here"
    
  4. Analyze: Review the note's content, comments, and engagement data to gather insights.

Security Scan

OpenClaw

gpt-5-mini

clean

OpenClaw 分析

The skill's code and instructions are internally consistent with its stated purpose (it drives a local Xiaohongshu MCP server and talks to localhost), but it requires running third‑party binaries that control your account session — review those binaries and use an isolated/test account before trusting them.

置信度: medium

VirusTotal

Type: OpenClaw Skill Name: xiaohongshu-mcp Version: 1.0.0 The skill is classified as suspicious due to its reliance on external, third-party binaries for core functionality. The `SKILL.md` explicitly instructs the user to download and execute `xiaohongshu-mcp` and `xiaohongshu-login` binaries from a GitHub repository, which then run a local server. While the bundled Python client (`scripts/xhs_client.py`) only communicates with this local server (`http://localhost:18060`) and does not exhibit direct malicious behavior (e.g., data exfiltration, remote execution), the requirement to run untrusted external executables introduces a significant supply chain risk and places a high trust burden on the user for a component outside the skill bundle's direct control.

元数据

  • 作者: @borye
  • 创建时间: 2026/02/01
  • 更新时间: 2026/04/13
  • 版本数: 1
  • 评论数: 0
  • 扫描时间: 2026/02/11

运行要求

官方公开数据里暂未列出运行要求。