Mcp Builder

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent MCP development guide with expected, user-directed testing and MCP connection helpers, and no artifact evidence of hidden credential use, persistence, exfiltration, or destructive behavior.

This skill appears safe to use as an MCP development guide. Before using its helper scripts or examples, review any command the agent proposes to run, connect only to trusted MCP servers, and avoid providing broad credentials or auth headers unless they are necessary and scoped.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI05: Unexpected Code Execution
Low
What this means

Running the suggested command can execute code in the user's development environment.

Why it was flagged

The guide recommends a user-directed command that can execute the MCP Inspector package. This is expected for MCP development testing, but it is still local package execution.

Skill content
Test with MCP Inspector: `npx @modelcontextprotocol/inspector`
Recommendation

Run these commands only in a trusted project environment and consider pinning package versions when reproducibility matters.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

If pointed at an untrusted or destructive MCP server, tool calls could affect external data or local state.

Why it was flagged

The helper can start a user-selected stdio MCP server command and call arbitrary MCP tool names on the connected server. This is central to MCP testing, but the chosen server/tools determine the real-world effect.

Skill content
return stdio_client(StdioServerParameters(command=self.command, args=self.args, env=self.env)) ... result = await self.session.call_tool(tool_name, arguments=arguments)
Recommendation

Connect only to MCP servers you trust, review the command being launched, and keep evaluation calls read-only unless the user explicitly approves mutations.

#
ASI07: Insecure Inter-Agent Communication
Low
What this means

Credentials or request metadata in headers could be sent to whatever MCP endpoint the user selects.

Why it was flagged

The helper supports remote MCP connections with caller-supplied URLs and headers. This is expected for MCP clients, but headers may contain sensitive authorization data.

Skill content
return sse_client(url=self.url, headers=self.headers) ... return streamablehttp_client(url=self.url, headers=self.headers)
Recommendation

Use HTTPS trusted endpoints, avoid sending auth headers to unfamiliar servers, and prefer least-privilege tokens.

#
ASI04: Agentic Supply Chain Vulnerabilities
Info
What this means

Generated MCP server code or design choices may vary if the external documentation changes.

Why it was flagged

The skill relies on live, mutable remote documentation from a main branch. This is reasonable for a current development guide, but the referenced content can change over time.

Skill content
Use WebFetch to load `https://raw.githubusercontent.com/modelcontextprotocol/typescript-sdk/main/README.md`
Recommendation

Use official documentation, verify version compatibility, and pin SDK/package versions in the actual MCP project.