analyze-server
Scannednpx machina-cli add skill Kavya-24/Watson/analyze-server --openclawPurpose
Conduct a security-focused audit of one or more MCP servers.
It does not perform discovery — only security analysis. Use list-servers skill to adequately find the server that is needed for inspection.
Outcomes
For each MCP server analyzed, you will produce:
- Configuration risk analysis
- Permission & blast radius assessment
- Supply-chain integrity evaluation
- GitHub issue & advisory recon
- Dependency vulnerability review
- Risk rating with justification
- Remediation plan
Operating Principles
- Treat MCP servers as privileged software.
- Default to zero trust.
- Separate facts from inferences.
- Provide evidence-backed conclusions.
- Focus on high-signal risks.
Step 1 — Configuration Risk Review
Evaluate:
A) Permission Scope
- Filesystem access breadth
- Network egress openness
- Tool execution capability
- Shell access
- Container isolation (if any)
Flag:
- Full disk access
- Unrestricted network
- Arbitrary command execution
B) Secrets Handling
Check for:
- Hardcoded tokens
.envcommitted- Plaintext credentials
- Debug logging of env vars
If detected → mark Critical
C) Version Pinning & Provenance
Assess:
- Docker using
latest - npm with no lockfile
- pip without hashes
- git branch refs (e.g.,
main) - No digest pin
Unpinned privileged server = High risk
Step 2 — GitHub & Web Recon (Required)
For each server:
2A) Identify Canonical Repository
Determine:
- Official GitHub repo
- Package registry page
- Docker source
If unclear:
- Search by server name + runtime + “MCP”
2B) Recent Issue Analysis (Last 90 Days)
Search for:
securityRCEauth bypasstoken leakSSRFpath traversalsandbox escapecrashdata loss
Capture:
- Title
- Status
- Recency
- Maintainer response
- Fix availability
2C) Vulnerability Advisory Review
Check:
- GitHub Security Advisories (GHSA)
- CVE/NVD
- OSV.dev
- npm/PyPI advisories
- Docker base image CVEs (if relevant)
Document:
- Advisory ID
- Affected versions
- Fixed version
- Severity (CVSS if available)
- Exploit type
Step 3 — Dependency Risk Analysis
If lockfiles exist:
- Identify top dependencies
- Check each for recent advisories
- Flag abandoned packages
Look for:
- Prototype pollution
- Deserialization issues
- Command injection
- Path traversal
- SSRF
Step 4 — Maintenance & Trust Signals
Evaluate:
- Release cadence
- Issue response time
- Open vs closed issue ratio
- Security policy presence
- Signed releases
Low activity + high privilege = elevated risk.
Step 5 — Risk Rating Framework
Critical
- Active RCE
- Secret exposure
- Known exploited vulnerability
- No fix available
High
- Serious vulnerability unpatched
- Wide permissions + weak validation
- Unpinned floating dependencies
Medium
- No known CVEs but weak hardening
- Slow maintenance
Low
- Pinned versions
- Narrow permissions
- No recent advisories
Always justify rating with evidence.
Step 6 — Remediation Plan
Provide:
Immediate
- Patch/upgrade version
- Pin dependencies
- Rotate exposed secrets
- Restrict permissions
Short-Term
- Add dependency scanning to CI
- Add secret scanning
- Containerize with least privilege
Long-Term
- Formal threat model
- Periodic security review
- Supply chain verification (SLSA, signed images)
Output Format
For each server:
Server: {Name}
Configuration Risks:
Permission Analysis:
Secrets Posture:
Supply Chain Risks:
Recent GitHub Issues:
Advisories/CVEs:
Dependency Risks:
Maintenance Signals:
Risk Rating:
Evidence:
Recommended Actions:
Completion Checklist
- Config risk reviewed
- Permissions analyzed
- GitHub issues reviewed (last 90 days)
- Advisories checked
- Dependencies examined
- Risk rating assigned
- Remediation provided
Source
git clone https://github.com/Kavya-24/Watson/blob/master/skills/analyze-server/SKILL.mdView on GitHub Overview
This skill performs a security-focused audit of MCP servers. It scans for recent GitHub issues and security advisories, evaluates configuration risk, secrets handling, and dependency health, and returns a remediation plan with concrete, evidence-backed actions.
How This Skill Works
The agent identifies the target MCP server via list-servers, gathers repository and dependency data, and conducts a GitHub issue and advisory reconnaissance for the last 90 days. It then assesses configuration risk, secrets posture, and supply-chain integrity, assigns a risk rating, and outputs a remediation plan with concrete steps.
When to Use It
- You want to validate a newly deployed MCP server for secure defaults and least-privilege configuration.
- You suspect secret exposure, hardcoded tokens, or misconfigurations in an MCP server.
- You need to verify dependencies against recent advisories and CVEs before production.
- You are preparing for an internal or external security audit and need a formal assessment.
- You perform periodic health checks to monitor risk and supply-chain integrity.
Quick Start
- Step 1: Use list-servers to identify the MCP server you want to audit.
- Step 2: Run analyze-server with the target server name or URL to generate the health/security report.
- Step 3: Review the report and apply the recommended remediation plan (immediate, short-term, long-term).
Best Practices
- Pin all dependencies and avoid floating or latest tags; enforce lockfiles and digests.
- Never store secrets in code; rotate and rotate again if exposure is detected.
- Integrate dependency and secret scanning into CI/CD pipelines with automated alerts.
- Apply least-privilege principles: restrict filesystem, network, and shell access; use container isolation.
- Maintain a security policy and pursue signed releases / SLSA for supply-chain verification.
Example Use Cases
- Audit a single Dockerized MCP server after a major update to verify no new exposures.
- Assess a fleet of MCP servers across production and staging for uniform hardening.
- Review recent GitHub issues and advisories that affect server dependencies within the last 90 days.
- Scan the base image for CVEs and ensure image tags are pinned to specific digests.
- Deliver an actionable remediation plan with immediate, short-term, and long-term steps.