mcp-grep-code
Fail
Audited by Snyk on Mar 13, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.95). These URLs are suspicious because they instruct downloading and piping a raw shell script from an unverified GitHub repo (raw.githubusercontent.com/vaayne/mcphub/main/scripts/install.sh) which can execute arbitrary code—while mcp.grep.app looks like a legitimate service, the tooling (mh) is provided from an unknown source, making this distribution method high-risk.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). This skill's searchGitHub tool (documented in SKILL.md) queries and returns code from public GitHub repositories via https://mcp.grep.app, which is untrusted, user-generated third‑party content that the agent is expected to read and could materially influence actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill's required installation step runs a remote installer with "curl -fsSL https://raw.githubusercontent.com/vaayne/mcphub/main/scripts/install.sh | sh", which fetches and executes remote shell code to install the required mh CLI.
Issues (3)
E005
CRITICALSuspicious download URL detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata