Skillforge MCP Server Hardening
Review an MCP server for prompt-exfiltration, shell abuse, overbroad tool scope, and unsafe logging.
install
source · Clone the upstream repo
git clone https://github.com/jamiojala/skillforge
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/jamiojala/skillforge "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/mcp-server-hardening" ~/.claude/skills/jamiojala-skillforge-mcp-server-hardening && rm -rf "$T"
manifest:
skills/mcp-server-hardening/SKILL.mdsource content
MCP Server Hardening
Review an MCP server for prompt-exfiltration, shell abuse, overbroad tool scope, and unsafe logging.
Source: Advanced first-party pack
Use this skill when
- The request signals
or a directly related problem.mcp hardening - The request signals
or a directly related problem.prompt exfiltration - The request signals
or a directly related problem.tool scope - The request signals
or a directly related problem.unsafe logging - The request signals
or a directly related problem.server safety
Gather this context first
- Relevant files, modules, or specs that define the current surface.
- Constraints, rollout limits, or non-goals that change the recommendation.
- What success looks like for the user, operator, or release owner.
Recommended workflow
- Confirm the trigger fit and boundaries before expanding scope.
- Identify the highest-risk files, interfaces, or decision points first.
- Produce a bounded plan or implementation slice with exact targets.
- Run the listed validation hooks or explain what blocks them.
- Return rollout, fallback, and open-question notes for the next agent or maintainer.
Output contract
- Capability summary and why this skill fits the request.
- Concrete file, module, or artifact targets.
- Validation plan and residual risk notes.
Failure modes to watch
- The pack matches the theme of the request but not the highest-leverage failure domain.
- Validation is mentioned without enough proof for another operator or agent to repeat it.
- The output becomes generic advice instead of a bounded next-step plan.
- The security story looks complete while indirect prompt, repo, or release paths remain exposed.
- Mitigations depend on operator memory instead of hard guardrails.
Operational notes
- State the smallest safe slice that can be executed or reviewed next.
- Leave enough evidence behind that another maintainer can continue without re-deriving the workflow.
- Call out where human review or approval changes the recommended path.
- Record what was hardened, what remains exposed, and where human approval is still required.
- Prefer controls that fail closed when context quality or operator confidence is low.
Dependency and composition notes
- Let this pack lead only when it owns the main bottleneck; otherwise treat it as a specialist sidecar.
- If another pack has a narrower, more concrete surface, hand off with explicit files, risks, and validation goals.
- Pairs well with orchestration, release, and api packs when guardrails span multiple surfaces.
Validation hooks
git_delegate_code_review
Model chain
deepseek-ai/deepseek-v3.2moonshotai/kimi-k2.5
Pack contents
for portable agent-skill usageSKILL.md
for runtime registry loadingskill.yaml
for human install and review contextREADME.md
for richer metadata and catalog indexingmarketplace.yaml