mcp-client

Warn

Audited by Snyk on Feb 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's CLI and scripts (scripts/mcp_client.py) explicitly connect to arbitrary remote MCP servers via URLs (e.g., Zapier, Brave Search, Puppeteer, SSE/streamable_http transports) and then call session.list_tools()/session.call_tool and read returned result.content, meaning it ingests and interprets untrusted third‑party/web content provided by those external servers.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 15, 2026, 10:14 PM