claude-code-skill
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (HIGH): The core functionality of the skill involves spawning subprocesses via the Model Context Protocol. In
src/mcp/client.ts, thecreateClientfunction usesStdioClientTransportto execute commands and arguments defined inmcp_config.json. An attacker who can modify this configuration file can achieve arbitrary command execution on the host system. - CREDENTIALS_UNSAFE (HIGH): The skill manages a configuration file (
mcp_config.json) that, according tomcp_config.example.json, is intended to store sensitive credentials such asGITHUB_TOKENandSLACK_BOT_TOKENin plain text. The code insrc/mcp/actions.tsreads and writes this file without any encryption or secure storage mechanisms. - EXTERNAL_DOWNLOADS (MEDIUM): The documentation and examples (e.g.,
examples/basic-mcp.ts) suggest usingnpx -yto download and run MCP servers directly from the npm registry. This patterns executes unverified remote code at runtime. - PROMPT_INJECTION (LOW): The README describes a
bypassPermissionsmode which disables user prompts for dangerous operations like file edits. If an agent is tricked via prompt injection while this mode is active, it could perform destructive actions on the local filesystem or environment without oversight.
Recommendations
- AI detected serious security threats
Audit Metadata