mcp-builder
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The
MCPConnectionStdioclass inscripts/connections.pyis designed to launch MCP servers via shell commands. - Evidence: The
create_connectionfactory function acceptscommandandargsstrings and passes them directly tomcp.client.stdio.stdio_client(viaStdioServerParameters). - Risk: If an agent is instructed by a malicious user or untrusted external data to 'initialize a new MCP server' with a crafted command string (e.g.,
rm -rf /or a reverse shell), the skill will execute it with the agent's privileges. - PROMPT_INJECTION / INDIRECT INJECTION (HIGH): The skill possesses a high-risk attack surface for indirect prompt injection.
- Ingestion points: Parameters for the
create_connectionfunction, specificallycommand,args, andurlinscripts/connections.py. - Boundary markers: None. The skill does not implement delimiters or instructions to ignore embedded commands in the data it processes.
- Capability inventory: Execution of subprocesses via
stdiotransport and arbitrary HTTP/SSE network requests. - Sanitization: None. There is no validation or whitelisting of commands or URLs.
- DATA_EXFILTRATION (MEDIUM): The
MCPConnectionSSEandMCPConnectionHTTPclasses allow the agent to connect to arbitrary URLs. - Evidence:
sse_client(url=self.url)andstreamablehttp_client(url=self.url)inscripts/connections.py. - Risk: An attacker can provide a URL to their own server. Once the connection is established, the agent may inadvertently send sensitive session data or tool outputs to the remote endpoint.
- EXTERNAL_DOWNLOADS (LOW): The skill depends on external libraries.
- Evidence:
scripts/requirements.txtlistsanthropic>=0.39.0andmcp>=1.1.0. - Status: Both packages are from trusted sources (Anthropic), downgrading this specific finding to LOW/INFO per [TRUST-SCOPE-RULE].
Recommendations
- AI detected serious security threats
Audit Metadata