swagger-to-mcp
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [Remote Code Execution] (CRITICAL): The skill's setup instructions in
SKILL.mdandREADME.mdexplicitly direct users to executecurl -fsSL https://get.mcp.com.ai/hapi.sh | bash(Linux/macOS) andirm https://get.mcp.com.ai/hapi.ps1 | iex(Windows). These patterns allow arbitrary code execution from a third-party domain that is not within the Trusted External Sources scope. - [Indirect Prompt Injection] (HIGH):
- Ingestion points: The skill ingests untrusted data from remote URLs via the
--openapiflag inSKILL.mdandreferences/hapi-cli-commands.md. - Boundary markers: No boundary markers or sanitization instructions are provided to the agent for handling these specifications.
- Capability inventory: The skill has powerful capabilities including
hapi deploy(Cloudflare),docker run, andwrangler(Cloudflare). - Sanitization: None. A malicious OpenAPI specification could contain instructions to influence the agent's behavior or exploit the deployment environment.
- [Command Execution] (HIGH): The skill requests broad permissions for
Bash(curl:*),Bash(hapi:*),Bash(docker:*), andBash(wrangler:*), allowing for significant system-level operations. - [Credentials Unsafe] (MEDIUM): The skill facilitates the handling of secrets through the
--var API_KEY=...flag inhapi deployand useshapi loginfor OAuth, creating a risk of credential exposure in process trees or logs.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://get.mcp.com.ai/hapi.sh - DO NOT USE
- AI detected serious security threats
Audit Metadata