use-mcp
Fail
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The instruction to use
echo "$ARGUMENTS" | gemini ...creates a command injection vulnerability. If the$ARGUMENTSvariable contains shell metacharacters (e.g.,;,&,|,`), it allows for the execution of arbitrary commands on the host system. - [COMMAND_EXECUTION]: The skill explicitly directs the agent to include the
-yflag when calling thegeminiCLI to "auto-approve tool execution." This pattern is dangerous as it suppresses user confirmation prompts, allowing the AI to perform potentially destructive or unauthorized actions without manual review. - [EXTERNAL_DOWNLOADS]: The skill references unverified external dependencies, specifically the
mcp-managementandmcp-builderskills. These represent a supply chain risk as their origin and contents are not defined within this skill's scope.
Recommendations
- AI detected serious security threats
Audit Metadata