mcp-code-execution

Warn

Audited by Socket on Feb 27, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

The document accurately describes a useful and efficient MCP code-execution pattern for reducing token usage and handling large/intermediate data while keeping PII out of model context. There is no direct evidence of malware in the file itself. However, the pattern inherently enables powerful capabilities (arbitrary code execution, filesystem access, network calls) that create moderate-to-high operational and supply-chain risk if the recommended controls (sandboxing, network isolation, PII tokenization, credential management, dependency verification, audit logging) are not correctly implemented and enforced. Before adopting this pattern in production, require concrete, tested sandbox implementations, strict credential governance, dependency verification, and continuous monitoring to mitigate exfiltration, credential forwarding, and sandbox-escape risks.

Confidence: 98%Severity: 75%
Audit Metadata
Analyzed At
Feb 27, 2026, 11:35 AM
Package URL
pkg:socket/skills-sh/laurigates%2Fclaude-plugins%2Fmcp-code-execution%2F@72046b0da4f76599254048dc95e74ddc41ed54ed