read-github
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The script
scripts/gitmcp.pyutilizesnpx -y mcp-remoteto dynamically download and execute themcp-remotepackage from the npm registry at runtime. This practice bypasses static dependency pinning and introduces risks if the registry or package is compromised.\n- COMMAND_EXECUTION (MEDIUM): The skill usessubprocess.Popento execute system commands. While arguments are passed as a list, the script does not strictly whitelist the MCP server URL, allowing it to connect to arbitrary remote servers provided as input.\n- REMOTE_CODE_EXECUTION (MEDIUM): The use ofnpxto execute a package that interacts with remote endpoints allows the agent to execute tools defined by potentially untrusted remote MCP servers.\n- PROMPT_INJECTION (LOW): The skill ingests data from GitHub repositories and external URLs without sanitization or boundary markers.\n - Ingestion points:
fetch-docs,search-docs,search-code, andfetch-urlmethods inscripts/gitmcp.py.\n - Boundary markers: Absent. The script prints raw content from the MCP server directly to the agent context.\n
- Capability inventory: The skill can execute local commands via
subprocessand perform network operations via themcp-remotebridge.\n - Sanitization: Absent. Content from external repositories is processed without filtering.
Audit Metadata