read-github
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The skill performs unpinned runtime downloads of Node.js packages. Evidence: In
scripts/gitmcp.py, the functionslist_toolsandcall_toolexecutenpx -y mcp-remote. This command downloads themcp-remotepackage from the npm registry at execution time if not cached. Impact: This introduces a supply chain risk where a compromised npm package could execute arbitrary code on the host system. - REMOTE_CODE_EXECUTION (HIGH): The skill connects to and executes logic from remote, untrusted servers. Evidence: The
npx -y mcp-remote [url]command establishes a connection to a remote Model Context Protocol (MCP) server at a URL derived from user/agent input (e.g.,gitmcp.io). Impact: If the remote server is malicious, it could exploit vulnerabilities in the client or provide malicious tool definitions that lead to further exploitation. - **PROMPT_INJECTION (Indirect
- HIGH):** The skill is highly vulnerable to Indirect Prompt Injection because its primary function is to ingest untrusted data from external repositories. 1. Ingestion Points:
scripts/gitmcp.pyretrieves content from external repositories viafetch-docs,search-docs, andsearch-code. 2. Boundary Markers: Absent. 3. Capability Inventory: The script usessubprocess.Popen. If the agent using this skill has other capabilities (like file manipulation), the risk is critical. 4. Sanitization: Absent. The script directly prints retrieved text to stdout for the agent to consume without filtering. - COMMAND_EXECUTION (MEDIUM): The skill relies on executing shell commands with arguments derived from potentially untrusted input. Evidence:
subprocess.Popen(["npx", ...])uses therepoargument provided to the script. Impact: While the conversion logic provides some normalization, using subprocess to run dynamic commands is a high-risk practice.
Recommendations
- AI detected serious security threats
Audit Metadata