controlling-spotify
Warn
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installation script
scripts/install-mcp-server.shclones a repository from an unverified GitHub account (marcelmarais/spotify-mcp-server) and executesnpm install, which involves downloading and running code from various third-party packages. - [COMMAND_EXECUTION]: The skill uses shell commands to build and run the Spotify MCP server. This includes using
scripts/apply-patch.jsto dynamically modify the server's source code before compilation to inject environment variable support. - [EXTERNAL_DOWNLOADS]: The skill downloads code and dependencies from external repositories on GitHub and the NPM registry during the installation phase.
- [CREDENTIALS_UNSAFE]: The skill requires the user to provide a Spotify
REFRESH_TOKEN, which grants long-term, broad access to their account. Storing such credentials in an agent's environment or project files increases the risk of exfiltration. - [PROMPT_INJECTION]: The skill identifies a potential indirect prompt injection surface by instructing the agent to scan project files for credential patterns. Ingestion Point: Scanning context and files for
.envblocks as described inSKILL.md. Boundary Markers: None identified. Capability Inventory: Network access via the Spotify API, file system access, and subprocess execution (node). Sanitization: No sanitization or validation of the scanned content is described.
Audit Metadata