read-github
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/gitmcp.pyscript usessubprocess.Popento execute thenpxcommand-line utility. - [EXTERNAL_DOWNLOADS]: The script executes
npx -y mcp-remote, which automatically downloads themcp-remotepackage from the NPM registry if it is not already installed locally. - [REMOTE_CODE_EXECUTION]: The skill connects to remote MCP servers (at
gitmcp.ioor arbitrary user-supplied URLs). These remote servers provide the tool definitions and logic that the agent subsequently executes. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it retrieves and processes documentation from external GitHub repositories. Malicious instructions embedded in these repositories could be used to manipulate the agent.
- Ingestion points: Data is fetched from
gitmcp.ioand arbitrary external URLs via thefetch-urlcommand inscripts/gitmcp.py. - Boundary markers: No delimiters or safety instructions are used to separate fetched content from the agent's context.
- Capability inventory: The skill can execute shell commands via
subprocess, make arbitrary network connections, and read repository documentation and code. - Sanitization: There is no evidence of validation or filtering of the content retrieved from remote repositories before it is passed to the agent.
Audit Metadata