mcp-configure

Fail

Audited by Snyk on Apr 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The skill explicitly supports an "agent-assisted" flow where the agent may accept a LAUNCHDARKLY_ACCESS_TOKEN from the user and write it into config (and warns the token will be visible in the config and conversation history), which requires the LLM to handle and output the secret verbatim, creating an exfiltration risk.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The skill includes a local-server fallback that runs remote code at runtime via npx (e.g., "npx -y @launchdarkly/mcp-server"), which fetches and executes a package as part of operation (see local server docs https://launchdarkly.com/docs/home/getting-started/mcp-local), so this is a runtime external dependency that executes remote code.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 16, 2026, 03:11 PM
Issues
2