hap-mcp-usage

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill instructs the agent to read user-provided URLs containing HAP-Appkey and HAP-Sign and to embed those full credentials verbatim into commands and configuration files (and into validation calls), which requires the LLM to handle and output secret values directly.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill instructs automatic environment/process scanning, silent modification of user configuration files, automatic use of supplied credentials (HAP-Appkey/HAP-Sign) and execution of commands (including npx), which enables credential exposure, unauthorized system modifications, and supply-chain risks without explicit user consent — therefore it is high risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill automatically adds and then calls user-provided MCP endpoints (e.g., URLs like "https://api.mingdao.com/mcp?HAP-Appkey=...&HAP-Sign=...") and explicitly invokes API methods such as get_app_info/get_app_worksheets_list to read application data, so it ingests and interprets third-party (potentially user-generated/untrusted) content at runtime.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 09:57 AM