searching-code
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- Data Exposure & Exfiltration (HIGH): The tool
mcp__morphllm__warpgrep_codebase_searchaccepts arepo_pathparameter as an absolute path. This capability allows the agent to access and read content from any directory the host process has permissions for, including sensitive areas like~/.ssh,/etc, or environment configuration files, without restricted scoping to a specific project directory.\n- Indirect Prompt Injection (MEDIUM): The skill is designed to ingest and reason over external content (source code). There are no boundary markers or sanitization processes defined to prevent the agent from obeying malicious instructions embedded in the code it retrieves. An attacker could place comments or strings in a repository that, when searched, take control of the agent's logic.\n - Ingestion points: Snippets retrieved via
mcp__morphllm__warpgrep_codebase_searchfrom the providedrepo_path.\n - Boundary markers: Absent in the skill instructions.\n
- Capability inventory: Access to tools like
Read,Grep, andmcp__morphllm__warpgrep_codebase_searchallows the agent to explore and export data based on search hits.\n - Sanitization: No filtering or sanitization of search results is implemented.
Recommendations
- AI detected serious security threats
Audit Metadata