mcp-development
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION] (HIGH): The
run_querytool inSKILL.mdis vulnerable to SQL injection. It constructs database queries using direct string interpolation:db.query(`${query} LIMIT ${limit}`). The validation checkstartsWith("SELECT")is insufficient as it can be bypassed using subqueries or stacked statements to access sensitive tables or perform unauthorized actions. - [DATA_EXFILTRATION] (MEDIUM): The
search_filestool allows for potential information disclosure. It accepts adirectoryparameter and uses it as the current working directory for a glob search without validating that the path stays within a restricted project root. This could be used to map out sensitive system files. - [PROMPT_INJECTION] (LOW): The
review-codeprompt template is susceptible to indirect prompt injection (Category 8). It takes untrusted code diffs and interpolates them directly into a user message without delimiters or protective instructions. Evidence Chain: 1. Ingestion point:diffparameter inreview-code. 2. Boundary markers: Absent. 3. Capability inventory: Database access (run_query) and file system mapping (search_files). 4. Sanitization: Absent. - [EXTERNAL_DOWNLOADS] (LOW): The skill imports
@modelcontextprotocol/sdk. Although this is a recognized protocol framework, the package source is not on the pre-approved trusted organization list, and dependencies are not pinned to specific versions.
Recommendations
- AI detected serious security threats
Audit Metadata