mcp-builder
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The evaluation harness provides the capability to execute system commands to launch MCP servers during testing.
- Evidence: In
scripts/connections.py, theMCPConnectionStdioclass uses themcplibrary'sstdio_clientto spawn a subprocess using thecommandandargsparameters provided via the command line inscripts/evaluation.py. - Context: This is an intended feature for local server testing and development.
- [PROMPT_INJECTION]: The
scripts/evaluation.pyscript possesses an attack surface for indirect prompt injection from external data sources. - Ingestion points: The script reads test questions from a user-provided XML file and accepts tool results from the MCP server being evaluated.
- Boundary markers: Absent. The external content is appended to the message history without delimiters or instructions to ignore embedded commands.
- Capability inventory: The script can execute subprocesses (via
stdiotransport), perform network operations (viaSSE/HTTPtransport), and access the Anthropic API. - Sanitization: Absent. Content is passed to the model without validation or escaping.
- [EXTERNAL_DOWNLOADS]: The skill instructions and scripts reference official repositories for documentation and dependencies.
- Evidence:
SKILL.mdcontains links tomodelcontextprotocol.ioand themodelcontextprotocolGitHub organization for specifications and SDK READMEs. - Context: These are well-known technology sources and the downloads are for legitimate development resources.
Audit Metadata