mcp-builder

Warn

Audited by Snyk on Mar 6, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The evaluation harness accepts a runtime MCP server URL (e.g., https://example.com/mcp) and uses it to fetch tool definitions via SSE/HTTP which are passed into the model as "tools" (controlling prompts/available actions) and can trigger remote tool execution, so the remote URL's content directly controls agent behavior at runtime.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 6, 2026, 10:32 AM