unicon-mcp
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill's installation instructions and metadata specify the download of the
@webrenew/unicon-mcp-serverpackage from the npm registry. The author 'webrenew' is not on the list of trusted organizations, making this an unverified dependency. - [REMOTE_CODE_EXECUTION] (MEDIUM): The configuration for Claude Desktop and Cursor uses
npx -y @webrenew/unicon-mcp-server. This pattern downloads and executes code directly from a remote repository at runtime, which can lead to arbitrary code execution on the host machine if the package is compromised. - [PROMPT_INJECTION] (LOW): The skill contains multiple tools that ingest untrusted data from the user or external sources, creating an attack surface for indirect prompt injection.
- Ingestion points: The
queryparameter insearch_icons,iconIdinget_icon, andiconIdsinget_multiple_iconsare points where untrusted strings enter the agent context. - Boundary markers: None are specified in the tool definitions to delimit user input from instructions.
- Capability inventory: The skill executes local node.js processes via
npxas defined in theSKILL.mdconfig instructions. - Sanitization: There is no evidence of input sanitization or validation within the provided skill definition.
Audit Metadata