byted-bytehouse-mcp

Warn

Audited by Socket on May 7, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/test_mcp_server.py

This script itself is a benign test harness, but it creates a moderate to high supply-chain and credential-exposure risk because it spawns a local helper binary and instructs it to fetch and run code directly from a remote GitHub repository while forwarding the full environment (including BYTEHOUSE_* credentials). There is no obfuscation or clear in-script malware, but running this script on a host where '/root/.local/bin/uvx' or the referenced repo is untrusted would allow arbitrary code execution and possible secret exfiltration. Recommend validating and pinning the remote code, ensuring uvx binary provenance, and not forwarding sensitive environment vars to untrusted processes.

Confidence: 75%Severity: 55%
Audit Metadata
Analyzed At
May 7, 2026, 07:25 AM
Package URL
pkg:socket/skills-sh/volcengine%2Fagentkit-samples%2Fbyted-bytehouse-mcp%2F@2005ed53b2d4a1945716366bbd0ed9769d6b3ba9