Scan Report
72 /100
uplo-defense
AI-powered defense knowledge management for ITAR-controlled information, personnel data, and mission documentation
This defense knowledge management skill presents significant supply chain and data exfiltration risks through unpinned npm package execution and external transmission of potentially sensitive defense information.
Do not install this skill
Avoid using this skill in production defense environments. The use of npx -y without version pinning creates a critical supply chain vulnerability. Consider alternatives that run entirely local or use version-pinned, audited dependencies.
Attack Chain 4 steps
⬡
Escalation User installs skill from clawhub/registry
README.md:35⬡
Escalation Skill config triggers 'npx -y @agentdocs1/mcp-server' without version pin
skill.json:15⬡
Escalation Attacker publishes malicious version of @agentdocs1/mcp-server to npm (or typosquat package)
npm registry◉
Impact Malicious MCP server receives API_KEY and defense data, exfiltrates to attacker-controlled endpoint
runtimeFindings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Unpinned npm package execution via npx -y Supply Chain | skill.json:15 |
| High | Defense-sensitive data routed to external third-party service Data Exfil | SKILL.md:1 |
| Medium | API key exposed to external MCP server process Credential Theft | skill.json:21 |
| Low | Identity patch file adds undeclared behavioral directives Doc Mismatch | identity-patch.md:1 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ | READ | ✓ Aligned | skill.json:15-23 - MCP server configured with HTTP transport to external URL |
| Environment | READ | READ | ✓ Aligned | skill.json:20-22 - API_KEY passed as env var to external service |
| Shell | NONE | WRITE | ✗ Violation | skill.json:14 - npx -y executes arbitrary npm package code |
10 findings
Medium External URL 外部 URL
https://img.shields.io/badge/ClawHub-uplo-defense-blue README.md:5 Medium External URL 外部 URL
https://clawhub.com/skills/uplo-defense README.md:5 Medium External URL 外部 URL
https://img.shields.io/badge/MCP-21_tools-green README.md:6 Medium External URL 外部 URL
https://img.shields.io/badge/schemas-5-orange README.md:7 Medium External URL 外部 URL
https://uplo.ai/schemas README.md:7 Medium External URL 外部 URL
https://your-instance.uplo.ai README.md:24 Medium External URL 外部 URL
https://clawhub.com/skills/uplo-knowledge-management README.md:60 Medium External URL 外部 URL
https://clawhub.com/skills/uplo-accounting README.md:61 Medium External URL 外部 URL
https://clawhub.com/skills/uplo-agriculture README.md:62 Medium External URL 外部 URL
https://app.uplo.ai skill.json:17 File Tree
4 files · 12.0 KB · 235 lines Markdown 3f · 186L
JSON 1f · 49L
├─
identity-patch.md
Markdown
├─
README.md
Markdown
├─
skill.json
JSON
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
@agentdocs1/mcp-server | latest (unpinned) | npm | No | CRITICAL: No version specified, fetched via npx -y |
npx | any | npm | No | Used to execute unpinned external package |
Security Positives
✓ No local script execution - all functionality is through documented MCP tools
✓ No direct filesystem access declared or required
✓ No credential harvesting or exfiltration observed in the skill files themselves
✓ Capabilities are relatively well-documented in SKILL.md