mcp-builder
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (HIGH): The
MCPConnectionStdioclass inscripts/connections.pyuses thestdio_clientto execute arbitrary system commands. This represents a critical capability that allows for unauthorized command execution if the command or its arguments are derived from untrusted user prompts. - REMOTE_CODE_EXECUTION (HIGH): The skill functions as a Category 8 Indirect Prompt Injection surface. Ingestion points:
list_toolsandcall_toolmethods inscripts/connections.py. Boundary markers: None. Capability inventory: Includes both subprocess execution (stdio_client) and network access (sse_client,streamablehttp_client). Sanitization: None. A malicious external MCP server could return tool definitions or results that manipulate the agent into performing unauthorized actions on the host system. - DATA_EXFILTRATION (MEDIUM): The
MCPConnectionSSEandMCPConnectionHTTPclasses allow connections to arbitrary URLs without validation. This could be used by an attacker to facilitate Server-Side Request Forgery (SSRF) or to exfiltrate sensitive data from the agent's environment to an external endpoint.
Recommendations
- AI detected serious security threats
Audit Metadata