NYC

mcp-cli

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes explicit examples that embed credentials directly in CLI arguments and auth headers (e.g., "Bearer your-token-here", "--auth-user "username:password"", and exporting/using personal access tokens), which would require the LLM to output secret values verbatim if followed.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill explicitly connects to arbitrary external MCP servers and fetches resources and prompts (e.g., "mcp tools https://example.com/mcp", "mcp read-resource ", and examples for GitHub/Brave Search/Puppeteer), so the agent can ingest untrusted public web or user-generated content that could deliver indirect prompt injection.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 08:34 PM