spoon-agent-development
Audited by Socket on Mar 11, 2026
3 alerts found:
Anomalyx2Obfuscated FileThe code orchestrates external tools and remote services to fulfill a research-answering workflow via an agent. There is potential security risk primarily from executing external commands and communicating with remote MCP endpoints. No explicit malicious logic detected in this fragment, but the reliance on external, potentially untrusted tools and network services warrants careful access controls, secret management, and auditing of the MCP tools and their data flows.
The file is a benign configuration reference but documents high-risk operational patterns: automated remote package execution (npx -y), arbitrary command invocation, plaintext credential placement in configs, and unrestricted outbound transports. The document should be updated to include secure defaults and mitigations: avoid npx -y for unverified packages, require package pinning and signature/provenance checks, use secret managers instead of inline `env` values, restrict allowed commands, run launched processes with least privilege/sandboxing, and require TLS + endpoint allowlisting. If these examples are used verbatim in production, they create a real supply-chain and data-exfiltration risk.
The SpoonReactMCP agent development skill presents a coherent, purpose-aligned framework for building AI agents with MCP tool integration and ReAct-style reasoning. There are no evident malicious or dangerous data flows in the provided content. Security posture appears appropriate for a development toolkit, with recommended best practices (no hardcoded keys) highlighted. Overall risk is low-to-moderate, primarily tied to correct usage and proper credential management in user implementations.