KVcore MCP CLI
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
The skill is classified as suspicious due to several high-risk capabilities described in `SKILL.md`. It explicitly offers 'raw endpoint access' via `kvcore_request`, allowing the AI agent to make arbitrary API calls to the KVcore system. Furthermore, it allows specifying a custom `KVCORE_BASE_URL`, which could redirect sensitive API interactions to an attacker-controlled server. The `twilio_call_create` function also permits arbitrary TwiML, enabling potential social engineering or phishing calls. These features, while potentially intended for flexibility, introduce significant prompt injection vulnerabilities, allowing an attacker to coerce the AI agent into performing unauthorized data exfiltration, modifications, or other harmful actions against the KVcore API or via Twilio.
