Analyze your own packages withvet GitHub

riseandignite/mcp-shield@19de96efe5ef8cd8a5676bf35efcb88b073879bf

Suspicious
Analyzed at:4/16/2025, 7:10:04 AM
Source:https://codeload.github.com/riseandignite/mcp-shield/legacy.zip/19de96efe5ef8cd8a5676bf35efcb88b073879bf
SHA256:bb303fe1c41750fe709d1a8366f62dbfce5e8a2f5ef86dc386cc17b27616b89a
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Multiple LLM analyses confirm malicious file reading, email forwarding, and data exfiltration attempts within the package. Lack of source info adds to suspicion.

Details

The package riseandignite/mcp-shield is highly suspicious and likely malicious based on the collected evidence. While YARA matches alone are insufficient, the multiple LLM-based analyses pointing to malicious behavior within mcp-servers-example/bad-mcp-server.js are highly concerning. These analyses consistently identify attempts to read sensitive files (including SSH keys and configuration files) using path traversal, exfiltrate data via email forwarding to a known malicious actor ('attacker@evil.com'), and redirect messages to a malicious phone number, potentially exfiltrating chat logs. The consistent pattern of malicious activities across multiple LLM analyses, despite the low confidence score of each individual analysis, strongly suggests a malicious intent. The lack of source project information (Evidence 7) further exacerbates the suspicion, as it hinders verification and transparency. Even though the confidence level of individual pieces of evidence is medium, the convergence of multiple independent LLM analyses pointing towards malicious behavior makes the overall assessment high confidence.