byted-bytehouse-mcp
Warn
Audited by Socket on May 7, 2026
1 alert found:
AnomalyAnomalyscripts/test_mcp_server.py
LOWAnomalyLOW
scripts/test_mcp_server.py
This script itself is a benign test harness, but it creates a moderate to high supply-chain and credential-exposure risk because it spawns a local helper binary and instructs it to fetch and run code directly from a remote GitHub repository while forwarding the full environment (including BYTEHOUSE_* credentials). There is no obfuscation or clear in-script malware, but running this script on a host where '/root/.local/bin/uvx' or the referenced repo is untrusted would allow arbitrary code execution and possible secret exfiltration. Recommend validating and pinning the remote code, ensuring uvx binary provenance, and not forwarding sensitive environment vars to untrusted processes.
Confidence: 75%Severity: 55%
Audit Metadata