MCP Integration

Pass

Audited by Gen Agent Trust Hub on Mar 9, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides templates for the 'stdio' MCP server type, which involves executing local commands and scripts. Documentation includes security best practices such as using absolute paths and avoiding the execution of user-controlled strings.
  • [EXTERNAL_DOWNLOADS]: The documentation includes examples that use npx to download and execute official MCP packages (e.g., @modelcontextprotocol/server-filesystem). These references target a well-known service associated with the protocol.
  • [PROMPT_INJECTION]: The skill facilitates Indirect Prompt Injection by providing patterns for autonomous agents that ingest and process data from external MCP tools (such as database query results). This creates a surface where malicious instructions embedded in external data could influence agent behavior. (1) Ingestion points: Data returned from MCP tools (e.g., mcp__plugin_db_server__query) as described in references/tool-usage.md. (2) Boundary markers: The provided agent examples do not explicitly demonstrate the use of delimiters or 'ignore' instructions for processed data. (3) Capability inventory: MCP tools can perform a wide range of actions including file system access, network requests, and subprocess execution. (4) Sanitization: No specific sanitization or validation logic is detailed for handling the content returned by MCP tools before it is processed by the agent.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 9, 2026, 07:31 PM