creating-mcp-servers
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): In
references/MANDATORY_PATTERNS.md, the skill includes instructions to install theuvtool usingcurl -LsSf https://astral.sh/uv/install.sh | sh. This is a piped execution of a remote script, which is a major security risk that allows for arbitrary code execution from an external source without verification. - [COMMAND_EXECUTION] (HIGH): The 'Skill Gateway' pattern in
references/PROGRESSIVE_DISCLOSURE.mdutilizessubprocess.runto execute local Python scripts based on paths and arguments passed through aparamsdictionary. This implementation lacks sanitization, enabling arbitrary command injection if the input parameters originate from an untrusted source or user prompt. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill's documentation retrieval workflow in
SKILL.mdandreferences/MANDATORY_PATTERNS.mdrelies onweb_fetchto retrieve content fromgofastmcp.com. As this domain is not a recognized trusted source, processing this content as authoritative documentation creates a surface for Indirect Prompt Injection (Category 8). - [DATA_EXFILTRATION] (LOW): The skill performs network requests to a non-whitelisted domain via
web_fetch. While the stated purpose is documentation retrieval, any external network communication to non-trusted domains carries a inherent risk of data exposure.
Recommendations
- AI detected serious security threats
Audit Metadata