mcp-builder
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The file
scripts/connections.pyimplementsMCPConnectionStdio, which utilizes thestdio_clientfrom themcplibrary to execute local processes. - Evidence: The
_create_contextmethod inMCPConnectionStdiopassescommand,args, andenvparameters directly toStdioServerParametersfor subprocess execution. This is a core feature of MCP but represents a significant security capability. - [EXTERNAL_DOWNLOADS] (LOW): The skill supports network-based transport layers for MCP servers.
- Evidence:
MCPConnectionSSEandMCPConnectionHTTPinscripts/connections.pyallow connections to arbitrary external URLs. While standard for the protocol, this facilitates outbound communication. - [REMOTE_CODE_EXECUTION] (LOW): Indirect Prompt Injection surface identified.
- Ingestion points: Untrusted data enters the agent context via the
call_toolmethod inscripts/connections.py, which returnsresult.contentfrom external MCP servers. - Boundary markers: Absent; the code does not implement delimiters or warnings for the agent to ignore instructions embedded in tool outputs.
- Capability inventory: The skill can execute subprocesses (
stdio_client) and perform network operations (sse_client,streamablehttp_client). - Sanitization: Absent; the response content from the MCP server is returned directly without validation or escaping.
Audit Metadata