youtube

clawhub:youtube

View source
F
4/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

14

Score

4/100

MEDIUM 12
LOW 2

Findings (14)

MEDIUM
Arbitrary MCP server execution
L90

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L99

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L106

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L113

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L120

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L150

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L161

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L175

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L259

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L263

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L267

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

MEDIUM
Arbitrary MCP server execution
L283

Detects execution of MCP servers from arbitrary paths, URLs, or user-controlled commands

call --stdio "n
FIX

Block MCP tools from shadowing or overriding built-in tools. Implement tool name uniqueness validation and prevent tools from registering names that conflict with system tools.

FP?

Likely FP if the tool has a name similar to a built-in tool by coincidence (e.g., a search tool) without malicious intent to override system behavior.

LOW
Global package installation
L25

Detects global installation of packages which affects the host system

npm install -g z
FIX

Replace npm install -g with a local install (npm install --save-dev) or use npx with a pinned version. Global installs modify the system and risk supply chain attacks.

FP?

Likely FP if the global install is for a well-known CLI tool (e.g., typescript, eslint) in setup documentation, though the supply chain risk remains real.

LOW
pip install arbitrary package
L31

Detects pip install of arbitrary packages that modify the host environment

pip install yt
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.