codebase-mcp
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): In
MCPORTER_SKILL.md, multiple commands usenpx -y mcporter. The-yflag bypasses confirmation and executes the package immediately from the npm registry. Without a pinned version or integrity hash, this introduces a major supply chain risk where a compromised or typosquatted package results in immediate RCE on the agent's environment. - [COMMAND_EXECUTION] (HIGH):
MCPORTER_SKILL.mdprovides shell logic that captures tool output into environment variables (AUTH_OUT=$(npx ...)) and then performs string matching viarg(ripgrep) to make execution decisions. If the tool output contains malicious shell metacharacters, it could lead to arbitrary command execution. - [DATA_EXFILTRATION] (MEDIUM): The skill utilizes a two-step upload process where a URL is retrieved from the server and then used in a
curl -X PUTcommand (UPLOAD_URL_FROM_PREVIOUS_STEP). This pattern allows for Server-Side Request Forgery (SSRF) or exfiltration if the server returns a URL pointing to an internal metadata service or an attacker-controlled endpoint. - [INDIRECT_PROMPT_INJECTION] (HIGH): The skill is designed to process external content for blog publication.
- Ingestion points: Tool outputs from
get_writing_style_guideand user-provided content increate_post(file:MCPORTER_SKILL.md). - Boundary markers: Entirely absent; external content is interpolated directly into command arguments.
- Capability inventory: File upload (
finalize_uploaded_image), blog publication (create_post), and local shell execution (npx). - Sanitization: No escaping or validation is performed on the content before it is passed to the shell or the API.
- [PROMPT_INJECTION] (LOW):
MCPORTER_SKILL.mdcontains selection rules in Korean and English ("사용자가 위 트리거 문구로...") that instruct the agent to override standard tool selection and prioritize this skill'smcporterflow. This effectively acts as a tool-hijacking instruction.
Recommendations
- AI detected serious security threats
Audit Metadata