MCP Workflow
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill is classified as suspicious due to a Local File Inclusion (LFI) vulnerability in `scripts/mcp-server.js`. The `ReadResourceRequestSchema` handler for `file://` URIs directly uses the path provided in the URI without any path sanitization, allowing an attacker or compromised agent to read arbitrary files on the filesystem (e.g., `file:///etc/passwd`). While the skill's workflow execution is currently mocked, this LFI vulnerability presents a significant risk for data exfiltration.
