smithery
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- Credentials Unsafe (MEDIUM): The command
smithery auth whoami --serverstarts an unauthenticated local HTTP server on port 4260 that serves the Smithery API key. - Evidence: File
references/AUTH.mdexplains this feature, which makes the sensitive API key accessible to any process or script on the local machine without authentication. - Remote Code Execution (MEDIUM): The skill's primary function is to connect to and execute logic from remote servers.
- Evidence:
references/CONNECT.mddescribes thesmithery tool callcommand, which runs tools provided by remote MCP servers. - External Downloads (LOW): The skill installs software and third-party skills from untrusted sources.
- Evidence:
SKILL.mdinstructs the user to install@smithery/clivia npm, andreferences/SKILLS.mddescribes adding third-party skills viasmithery skill add. - Indirect Prompt Injection (LOW): The skill processes data from external tools which could contain malicious instructions.
- Ingestion points: Outputs from
smithery tool callas described inreferences/CONNECT.md. - Boundary markers: None mentioned in the documentation for tool output handling.
- Capability inventory: Includes subprocess command execution via the Smithery CLI across multiple reference files.
- Sanitization: No evidence of sanitization or validation of tool output before it is returned to the agent context.
Audit Metadata