context7-efficient

Pass

Audited by Gen Agent Trust Hub on Feb 26, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill uses npx -y @upstash/context7-mcp in scripts/start-server.sh and scripts/fetch-docs.sh to download and execute the Context7 MCP server from the NPM registry. Upstash is recognized as a well-known technology provider, and NPM is a trusted registry.
  • [COMMAND_EXECUTION]: The Python utility scripts/mcp-client.py utilizes subprocess.Popen with shell=True to execute the MCP server command. While the command is hardcoded within the skill's orchestrator scripts (fetch-docs.sh), the use of shell=True is a noted capability for command execution.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) as it processes untrusted documentation from external libraries.
  • Ingestion points: Documentation is fetched from the Context7 MCP server via scripts/fetch-raw.sh.
  • Boundary markers: scripts/fetch-docs.sh adds Markdown headers such as '## Code Examples' and '## API Signatures' to delineate content, but does not provide explicit 'ignore instructions' delimiters.
  • Capability inventory: The skill can execute shell commands via npx, manage local processes (start/stop server), and perform network requests via the Python client's HTTP transport.
  • Sanitization: Content is filtered using awk, grep, and sed to extract technical details, which reduces the volume of text but does not specifically sanitize or escape potential natural language instructions embedded in the documentation.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 26, 2026, 04:44 AM