agent-mail
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- Remote Code Execution (CRITICAL): Multiple files and automated scan reports identify the use of piped remote execution patterns (e.g.,
curl | bash). Documentation in.beads/README.mdinstructs users to install usingcurl -sSL https://raw.githubusercontent.com/steveyegge/beads/main/scripts/install.sh | bash. The automated scan also detected installers fromDicklesworthstone. These GitHub accounts are not in the trusted repository list, exposing users to arbitrary code execution during installation. - Command Execution (HIGH): The script
scripts/automatically_detect_all_installed_coding_agents_and_install_mcp_agent_mail_in_all.shperforms intrusive operations by scanning for and modifying sensitive AI agent configuration files in the home directory (~/.claude,~/.cursor,~/.gemini). While intended for integration, this broad capability to modify system-level configurations poses a significant security risk. - Credentials Unsafe (HIGH): The configuration file
.claude/settings.jsoncontains a hardcoded bearer token (dc5029ac32a9f350508a565af683205cf99f25c896b07c07bc53a9517877ce8c). Hardcoding secrets in a repository is a high-risk practice that can lead to unauthorized access to the MCP server. - Indirect Prompt Injection (LOW): As a messaging server, the skill ingests untrusted text from other agents or external sources, creating a surface for indirect prompt injection. • Ingestion points: Untrusted data enters via the
send_messagetool and is retrieved throughfetch_inboxorresource://inbox/(seen insrc/mcp_agent_mail/app.py). • Boundary markers: There are no explicit delimiters or instructions to ignore embedded commands in the tool output provided to the LLM. • Capability inventory: The server possesses broad capabilities including file system access, network communication, and execution ofgitsubprocesses. • Sanitization: While HTML sanitization is used for the web viewer, there is no evidence of filtering or instruction-stripping for content delivered directly to the AI agent context. - Dynamic Execution (MEDIUM): Maintenance and integration scripts frequently use
eval "$(uv run python ...)"to execute shell commands generated by Python logic. This increases the risk of command injection if the Python script's output is compromised.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/Dicklesworthstone/mcp_agent_mail/main/scripts/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata