mcp-health-checker
Warn
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
check.pyutilizessubprocess.Popento run commands and arguments defined in MCP configuration files (e.g.,mcp.yaml,mcp.json). This occurs in theprobe_stdio_serverfunction during health probes. - [EXTERNAL_DOWNLOADS]: For servers using the HTTP transport, the
probe_http_serverfunction incheck.pyperforms network requests usingurllib.request.urlopento URLs specified in the user's configuration files. - [REMOTE_CODE_EXECUTION]: Because the skill executes programs and parameters directly from external configuration files, it enables a path for code execution. If an attacker or a malicious process modifies the configuration files targeted by the skill, they can execute arbitrary code with the agent's permissions.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted data from external sources.
- Ingestion points: Reads MCP server definitions and environment variables from
~/.openclaw/config/mcp.yamland related paths; processes stdout from probed subprocesses incheck.py. - Boundary markers: Absent; the skill does not use delimiters or instructions to ignore embedded commands in the processed data.
- Capability inventory: Includes
subprocess.Popenfor command execution andurllib.requestfor network operations. - Sanitization: None; commands, arguments, and URLs from the configuration are used directly without validation or escaping.
Audit Metadata