mcp-vods
Warn
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill uses
npx -y mcporteranduvx mcp-vodsto fetch tools at runtime. These packages are sourced from public registries (NPM and PyPI) and do not belong to the trusted organizations or repositories list. This creates a dependency on unverified third-party code. - [COMMAND_EXECUTION] (MEDIUM): The primary functionality is delivered through shell command execution (
npx ... mcporter call). The use of external inputs likekeywordandurlwithin these shell commands could lead to command injection if the underlyingmcporterormcp-vodstools do not properly sanitize arguments. - [REMOTE_CODE_EXECUTION] (MEDIUM): Both
npx(Node.js) anduvx(Python/uv) are designed to download and execute code immediately. This pattern is inherently risky as it executes the latest version of remote code without manual verification or integrity checks.
Audit Metadata