Get the FREE Ultimate OpenClaw Setup Guide →

analyze-server

Scanned
npx machina-cli add skill Kavya-24/Watson/analyze-server --openclaw
Files (1)
SKILL.md
4.3 KB

Purpose

Conduct a security-focused audit of one or more MCP servers.

It does not perform discovery — only security analysis. Use list-servers skill to adequately find the server that is needed for inspection.

Outcomes

For each MCP server analyzed, you will produce:

  1. Configuration risk analysis
  2. Permission & blast radius assessment
  3. Supply-chain integrity evaluation
  4. GitHub issue & advisory recon
  5. Dependency vulnerability review
  6. Risk rating with justification
  7. Remediation plan

Operating Principles

  • Treat MCP servers as privileged software.
  • Default to zero trust.
  • Separate facts from inferences.
  • Provide evidence-backed conclusions.
  • Focus on high-signal risks.

Step 1 — Configuration Risk Review

Evaluate:

A) Permission Scope

  • Filesystem access breadth
  • Network egress openness
  • Tool execution capability
  • Shell access
  • Container isolation (if any)

Flag:

  • Full disk access
  • Unrestricted network
  • Arbitrary command execution

B) Secrets Handling

Check for:

  • Hardcoded tokens
  • .env committed
  • Plaintext credentials
  • Debug logging of env vars

If detected → mark Critical


C) Version Pinning & Provenance

Assess:

  • Docker using latest
  • npm with no lockfile
  • pip without hashes
  • git branch refs (e.g., main)
  • No digest pin

Unpinned privileged server = High risk


Step 2 — GitHub & Web Recon (Required)

For each server:

2A) Identify Canonical Repository

Determine:

  • Official GitHub repo
  • Package registry page
  • Docker source

If unclear:

  • Search by server name + runtime + “MCP”

2B) Recent Issue Analysis (Last 90 Days)

Search for:

  • security
  • RCE
  • auth bypass
  • token leak
  • SSRF
  • path traversal
  • sandbox escape
  • crash
  • data loss

Capture:

  • Title
  • Status
  • Recency
  • Maintainer response
  • Fix availability

2C) Vulnerability Advisory Review

Check:

  1. GitHub Security Advisories (GHSA)
  2. CVE/NVD
  3. OSV.dev
  4. npm/PyPI advisories
  5. Docker base image CVEs (if relevant)

Document:

  • Advisory ID
  • Affected versions
  • Fixed version
  • Severity (CVSS if available)
  • Exploit type

Step 3 — Dependency Risk Analysis

If lockfiles exist:

  • Identify top dependencies
  • Check each for recent advisories
  • Flag abandoned packages

Look for:

  • Prototype pollution
  • Deserialization issues
  • Command injection
  • Path traversal
  • SSRF

Step 4 — Maintenance & Trust Signals

Evaluate:

  • Release cadence
  • Issue response time
  • Open vs closed issue ratio
  • Security policy presence
  • Signed releases

Low activity + high privilege = elevated risk.


Step 5 — Risk Rating Framework

Critical

  • Active RCE
  • Secret exposure
  • Known exploited vulnerability
  • No fix available

High

  • Serious vulnerability unpatched
  • Wide permissions + weak validation
  • Unpinned floating dependencies

Medium

  • No known CVEs but weak hardening
  • Slow maintenance

Low

  • Pinned versions
  • Narrow permissions
  • No recent advisories

Always justify rating with evidence.


Step 6 — Remediation Plan

Provide:

Immediate

  • Patch/upgrade version
  • Pin dependencies
  • Rotate exposed secrets
  • Restrict permissions

Short-Term

  • Add dependency scanning to CI
  • Add secret scanning
  • Containerize with least privilege

Long-Term

  • Formal threat model
  • Periodic security review
  • Supply chain verification (SLSA, signed images)

Output Format

For each server:

Server: {Name}

Configuration Risks:
Permission Analysis:
Secrets Posture:
Supply Chain Risks:
Recent GitHub Issues:
Advisories/CVEs:
Dependency Risks:
Maintenance Signals:

Risk Rating:
Evidence:

Recommended Actions:


Completion Checklist

  • Config risk reviewed
  • Permissions analyzed
  • GitHub issues reviewed (last 90 days)
  • Advisories checked
  • Dependencies examined
  • Risk rating assigned
  • Remediation provided

Source

git clone https://github.com/Kavya-24/Watson/blob/master/skills/analyze-server/SKILL.mdView on GitHub

Overview

This skill performs a security-focused audit of MCP servers. It scans for recent GitHub issues and security advisories, evaluates configuration risk, secrets handling, and dependency health, and returns a remediation plan with concrete, evidence-backed actions.

How This Skill Works

The agent identifies the target MCP server via list-servers, gathers repository and dependency data, and conducts a GitHub issue and advisory reconnaissance for the last 90 days. It then assesses configuration risk, secrets posture, and supply-chain integrity, assigns a risk rating, and outputs a remediation plan with concrete steps.

When to Use It

  • You want to validate a newly deployed MCP server for secure defaults and least-privilege configuration.
  • You suspect secret exposure, hardcoded tokens, or misconfigurations in an MCP server.
  • You need to verify dependencies against recent advisories and CVEs before production.
  • You are preparing for an internal or external security audit and need a formal assessment.
  • You perform periodic health checks to monitor risk and supply-chain integrity.

Quick Start

  1. Step 1: Use list-servers to identify the MCP server you want to audit.
  2. Step 2: Run analyze-server with the target server name or URL to generate the health/security report.
  3. Step 3: Review the report and apply the recommended remediation plan (immediate, short-term, long-term).

Best Practices

  • Pin all dependencies and avoid floating or latest tags; enforce lockfiles and digests.
  • Never store secrets in code; rotate and rotate again if exposure is detected.
  • Integrate dependency and secret scanning into CI/CD pipelines with automated alerts.
  • Apply least-privilege principles: restrict filesystem, network, and shell access; use container isolation.
  • Maintain a security policy and pursue signed releases / SLSA for supply-chain verification.

Example Use Cases

  • Audit a single Dockerized MCP server after a major update to verify no new exposures.
  • Assess a fleet of MCP servers across production and staging for uniform hardening.
  • Review recent GitHub issues and advisories that affect server dependencies within the last 90 days.
  • Scan the base image for CVEs and ensure image tags are pinned to specific digests.
  • Deliver an actionable remediation plan with immediate, short-term, and long-term steps.

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers