mcp-server-building
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill provides a functional template for a
fetch_urltool inSKILL.mdthat ingests untrusted external content and returns it directly to the agent's context. This is a critical vulnerability surface for Indirect Prompt Injection where attacker-controlled web content can override agent instructions. Mandatory evidence: (1) Ingestion point:fetch(url)inSKILL.md. (2) Boundary markers: Absent. (3) Capability: Network read + text return. (4) Sanitization: Absent in code examples.\n- [Remote Code Execution] (HIGH): Documentation inreferences/testing-patterns.mdandreferences/transport-patterns.mdrecommends usingnpxto execute remote packages (@modelcontextprotocol/inspector,@myorg/db-tools). Running unverified packages vianpxis a high-risk pattern for supply chain attacks, especially when using placeholders like@myorg.\n- [Data Exposure & Exfiltration] (MEDIUM): Thereferences/resource-patterns.mdfile demonstrates exposing local files as resources (e.g.,settings.jsonviaPath.read_text()). While demonstrated for config files, this pattern facilitates the exposure of sensitive local data if implemented without strict path validation or least-privilege constraints.\n- [Prompt Injection] (INFO): The automated scanner alert regardingrequest.params.nameis a false positive. This string is a standard property access in the MCP TypeScript SDK and does not constitute a malicious URL or injection attempt.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata