mcp-builder
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): File
SKILL.md(Phase 3.2) recommends runningnpx @modelcontextprotocol/inspector. This command downloads and executes a package from the npm registry at runtime. Since the@modelcontextprotocolorganization is not in the Trusted Organizations list, this is an unverifiable remote code execution finding. - [COMMAND_EXECUTION] (MEDIUM): File
scripts/connections.pyimplements theMCPConnectionStdioclass which usesmcp.client.stdio.stdio_clientto spawn and manage subprocesses. While this is the intended mechanism for MCP local servers, it provides a high-privilege capability that could be abused by a malicious agent to execute arbitrary local commands. - [EXTERNAL_DOWNLOADS] (LOW): The skill fetches protocol specifications and SDK README files from
modelcontextprotocol.ioandraw.githubusercontent.com(Phase 1.2, 1.3). These sources are not on the trusted list, though the downloads are primarily for documentation. - [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8). Evidence: 1. Ingestion points in
SKILL.mdPhase 1.2/1.3 (fetching external markdown); 2. Boundary markers are absent; 3. Capability inventory includes subprocess execution inscripts/connections.py; 4. Sanitization is absent.
Audit Metadata