gemini-mcp

Warn

Audited by Snyk on Feb 16, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill includes MCP servers that perform external HTTP requests and return their responses to the agent (see api-mcp-server.js using axios with BASE_URL and examples configuring Stripe and other external APIs), so the agent will fetch and interpret untrusted third-party API content as part of its workflow.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill explicitly shows integration examples for a Stripe MCP server (gemini mcp add --name "stripe" ... STRIPE_KEY) and contains YOLO automation examples that perform payment actions: "Create a new customer and subscription using Stripe with full setup" and "Process payment via Stripe MCP". Those examples and the Stripe-specific configuration are specific payment-gateway capabilities (not merely a generic API caller) and directly describe sending/processing payments. Therefore it grants direct financial execution authority.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 01:09 AM