read-no-evil-mcp

clawhub:read-no-evil-mcp

View source
A
100/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

3

Score

100/100

LOW 3

Findings (3)

LOW
Shell script file execution
L48

Detects execution of shell script files via bash/sh command or direct invocation

bash
   scripts/setup-server.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
pip install arbitrary package
L71

Detects pip install of arbitrary packages that modify the host environment

pip install re
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
Unrestricted email or messaging access
L128

Detects CLI tools granting unrestricted send/read access to email or messaging

py send --to "user@example.com" --subject
FIX

Restrict email and messaging API access to user-initiated actions. Prevent automated sending that could exfiltrate data via email body or attachments.

FP?

Likely FP if the skill is an email client or messaging tool whose documented purpose is to send messages on behalf of the user.