-
-
Notifications
You must be signed in to change notification settings - Fork 679
Description
Hi! I'm part of the ClawGuard team — we built an open-source security scanner for MCP servers (MIT, https://github.com/joergmichno/clawguard).
While running our MCP Security Scanner against popular servers, we found a potential issue in desktop-commander:
Finding: The tool description for run_terminal_cmd contains a behavioral instruction:
"You must always include full paths"
While this specific instruction is benign, embedding behavioral directives in tool descriptions is the primary vector for MCP Tool Poisoning attacks (ref: Invariant Labs, Palo Alto Unit42). A malicious fork could replace this with harmful instructions that override the AI agent's safety constraints.
Recommendation: Move behavioral guidance to the system prompt or documentation rather than embedding it in tool descriptions. This follows the principle of least privilege for tool interfaces.
Risk Level: LOW — No immediate exploit, but establishes a pattern that attackers can abuse.
Full scan report: https://prompttools.co/shield/blog/mcp-security-audit.html
Scanner (MIT): https://github.com/joergmichno/clawguard
Happy to discuss further. No action required — just a heads-up from one security-focused dev to another.
Best,
Joerg Michno
ClawGuard — AI Agent Security