mcp-server-tester

Warn

Audited by Socket on Mar 2, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

This skill's stated purpose (MCP server testing) aligns with most of its capabilities: discovery, proxying, and LLM-driven test generation legitimately require network access and an LLM key. However, the combination of (1) accepting and optionally persisting LLM API keys, (2) proxying all MCP traffic via a local inspector that executes curl calls, and (3) allowing provider base URL overrides creates a moderate supply-chain and credential-forwarding risk. The fragment does not document the inspector's installation provenance, signature verification, or restrictions on provider endpoints; these omissions raise the chance of credential exfiltration or routing sensitive data to attacker-controlled endpoints if misconfigured. I did not find explicit malicious code in this fragment, but the operational pattern (download/execute/forward, persistent secrets, configurable endpoints) is a realistic vector for abuse. Recommendations: require explicit, documented, verifiable inspector provenance (signed releases or official registry packages), avoid persisting secrets by default, warn users about custom provider base URLs, and implement redaction/opt-in logging for test reports.

Confidence: 85%Severity: 75%
Audit Metadata
Analyzed At
Mar 2, 2026, 03:36 PM
Package URL
pkg:socket/skills-sh/yigitkonur%2Fskill-mcp-server-tester%2Fmcp-server-tester%2F@eada5f3a055734ed2c1bbfc66e14793f35de8981