tavily-research
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The script
scripts/research.shutilizesnpx -y mcp-remoteto download and run a utility for OAuth authentication from the npm registry. - [COMMAND_EXECUTION]: Executes shell utilities including
curl,jq, andbase64withinscripts/research.shto handle API requests and data parsing. - [DATA_EXFILTRATION]: Reads sensitive credential files from
~/.mcp-auth/inscripts/research.sh. It implements a check to verify the JWT issuer ishttps://mcp.tavily.com/before usage. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection from third-party web content.
- Ingestion points: External research data ingested via
curlinscripts/research.sh. - Boundary markers: Absent; research results are returned as raw text or structured JSON.
- Capability inventory: Network requests via
curland local file writing inscripts/research.sh. - Sanitization: Absent; external data is not sanitized before being returned to the agent context.
Audit Metadata