mcp-duckgo
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution & External Downloads (HIGH): The skill uses
npx -y mcporteranduvx duckduckgo-mcp-serverto download and run code from the npm and PyPI registries at runtime. This behavior does not specify versions or verify package integrity, and the packages are not from trusted organizations, which could lead to arbitrary code execution if the packages are compromised. - Indirect Prompt Injection (LOW): The
fetch_contentcommand reads data from arbitrary web URLs, creating an attack surface for indirect prompt injection where malicious instructions in the scraped content could influence the agent. - Ingestion points: Results from
fetch_contentinSKILL.md. - Boundary markers: Absent; no delimiters are used to wrap external content.
- Capability inventory: Shell execution via
npxanduvx. - Sanitization: Absent; there is no evidence of data sanitization before ingestion.
Recommendations
- AI detected serious security threats
Audit Metadata