fastmcp
Warn
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/scaffold_fastmcp.pyscript is vulnerable to code injection. It uses a simple string replacement to insert the user-provided--nameargument into a Python template. An attacker providing a maliciously crafted name could inject and execute arbitrary Python code when the resulting server script is subsequently run. - [DATA_EXFILTRATION]: The
templates/file_processor.pytemplate facilitates unrestricted filesystem access. Its tools usePath(path).expanduser()to read files without path-traversal protection or directory-based sandboxing. This allows an agent to be directed to read any file the user has permissions for, including sensitive credentials in~/.ssh/or.envfiles. - [COMMAND_EXECUTION]: The skill includes functionality to modify the configuration of external applications. The
fastmcp installcommands documented inSKILL.mdandreferences/fastmcp-cli.mdwrite to the configuration directories of Claude Desktop, Claude Code, and Cursor to register new servers, which acts as a persistence mechanism and alters the behavior of those clients.
Audit Metadata