mcp-management
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill spawns subprocesses to run MCP servers according to the user-defined configuration in
.claude/.mcp.json. Evidence: Thescripts/mcp-client.tsfile utilizes the@modelcontextprotocol/sdkto createStdioClientTransportinstances for each configured server.- [EXTERNAL_DOWNLOADS]: The skill documentation recommends using official package managers to install and run MCP server packages. Evidence: Instructions in theREADME.mdandreferences/configuration.mdsuggest usingnpm installfor local scripts andnpxfor executing remote servers like@modelcontextprotocol/server-memory.- [REMOTE_CODE_EXECUTION]: Facilitates running remote code by providing configuration patterns and commands that usenpxto fetch and execute packages from the NPM registry. Evidence: The integration guides provide examples for running various MCP servers directly vianpx.- [PROMPT_INJECTION]: The skill handles data from external MCP servers, which constitutes an attack surface for indirect prompt injection. Ingestion points: Tool definitions, prompts, and resource contents are retrieved from external servers inscripts/mcp-client.ts. Boundary markers: The skill includes aGEMINI.mdfile that enforces structured JSON response formatting for the Gemini CLI, reducing natural language ambiguity. Capability inventory: Depending on the configured servers, the skill can execute commands, access the file system, and perform network operations. Sanitization: While the skill uses structured JSON communication, it does not apply specific content filtering to the data returned by the servers.
Audit Metadata