First Seen
Feb 18, 2026
Last Scanned
Feb 22, 2026
Findings
3
Score
69/100
Findings (3)
Detects skills that both read sensitive credential files and send data to external services
access email/password + POST to `/api Block access to git credentials, SSH keys, and repository tokens. If git operations are needed, use scoped deploy keys and restrict the tool to specific repositories.
Likely FP if the match is documentation about git configuration (e.g., setting up git credentials helper) rather than code that reads and transmits them.
Detects screenshot/screen capture tools combined with upload or transmission
screenshot + POST to `/api Block the ability to read and transmit contents of configuration files (.env, config.json, settings.yaml). Implement file path validation to prevent access to sensitive config files.
Likely FP if the skill reads config files to configure itself locally without transmitting the contents externally.
Detects patterns where credential or secret reads are combined with external data transmission
access email/password + POST to `/api/tee-times/tee-time-result Prevent credentials and sensitive data obtained by one MCP tool from being passed to other tools. Implement data isolation between tools and restrict cross-tool data flow for secrets.
Likely FP if the cross-tool data flow is intentional API authentication (e.g., a tool fetches an auth token that another tool uses for the same service).