cve-impact

Pass

Audited by Gen Agent Trust Hub on Apr 3, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill invokes a local Python parser script (references/01-cve-response-parser.py) to process and aggregate JSON responses from MCP tools. Technical review of the script confirms it uses standard libraries and performs safe data extraction without dynamic code execution or network operations.
  • [SAFE]: The skill enforces mandatory Human-in-the-Loop (HITL) checkpoints for pagination when dealing with system-level CVE discovery. This prevents potential resource exhaustion or API rate-limiting issues by requiring user consent for multiple API calls.
  • [SAFE]: Credentials and service account secrets are managed correctly via environment variables (LIGHTSPEED_CLIENT_ID, LIGHTSPEED_CLIENT_SECRET) rather than being hardcoded within the skill configuration or scripts.
  • [SAFE]: While the skill ingests untrusted vulnerability data from external MCP tools (Indirect Prompt Injection surface), the data is handled safely by a structured parser and formatted into reports. There is no evidence that this data is used to generate or influence subsequent executable commands within the skill's logic.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 3, 2026, 08:08 AM