mcp-server-builder
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The TypeScript code example for the
run_teststool inSKILL.mdis vulnerable to command injection. It directly interpolates thefile_patternargument into a shell command (pnpm test ${args}) without any validation or escaping, allowing for arbitrary shell command execution. - [COMMAND_EXECUTION]: The
search_codebasetool template inSKILL.mdcontains a command injection vulnerability. The sanitization attempt using.replace(/'/g, "\\'")is ineffective for shell single-quotes in most environments (like bash), and thefile_globvariable is interpolated without any sanitization, allowing an attacker to break the shell context and execute arbitrary commands. - [REMOTE_CODE_EXECUTION]: The script
scripts/server_scaffolder.pygenerates full TypeScript and Python source files and writes them to the local file system. It also sets execution permissions for the generated Python files, which creates a significant security risk if the input configuration is malicious or untrusted. - [PROMPT_INJECTION]: The
scripts/openapi_converter.pyscript presents a surface for indirect prompt injection. It parses external OpenAPI/Swagger specifications and uses their summary and description fields to generate MCP tool documentation. An attacker could craft a specification with malicious instructions in these fields to influence agent behavior when it consumes the generated tool server. - Ingestion points:
scripts/openapi_converter.py(viaload_specandconvert_specfunctions). - Boundary markers: None identified; external content is used directly in tool descriptions.
- Capability inventory:
scripts/server_scaffolder.py(file-write) andSKILL.mdcode templates (shell execution viaexecSyncandsubprocess.run). - Sanitization: Performed for tool names (snake_case) but absent for descriptive fields where natural language instructions are processed.
Recommendations
- AI detected serious security threats
Audit Metadata