F

Public audit · 2026-04-24

honeycombio/honeycomb-mcp

Overall: F (30/100) · v0.2 scan · 6 axes · LLM prompt-injection probe

SkillAudit report — honeycombio/honeycomb-mcp

Scanned 2026-04-24 by SkillAudit v0.2 (static checks + LLM-assisted prompt-injection red-team).
Commit: cb3a233 · Stars: 43 · Days since last push: 246
LLM prompt-injection probe: no-tool-surface

Overall grade: F (30/100)

AxisScoreGrade
security40/100F
permissions100/100A
credentials30/100F
maintenance60/100D
compatibility100/100A
docs80/100B⚠️

Security findings

Production sources:

const response = await fetch(url, {

const response = await fetch(\${env.apiEndpoint}/1/auth\, { headers });

Permissions

_No findings on this axis._

Credentials

Production sources:

console.log(\Using MCP server command: ${process.env.MCP_SERVER_COMMAND}\);

console.log(\Using MCP server URL: ${process.env.MCP_SERVER_URL}\);

.env.example

Maintenance

Production sources:

246 days

archived

Compatibility

_No findings on this axis._

Documentation

Production sources:

missing

no repository


Methodology

SkillAudit v0.2 clones the repo at the provided ref (default: default branch, HEAD) into an ephemeral sandbox, runs six static checks over .js/.ts/.py sources, queries the GitHub API for maintenance signals, and runs an LLM-assisted prompt-injection red-team over the MCP tool surface. Each axis is scored against the rubric at .

The prompt-injection axis extracts each server.tool(...) / @app.tool registration + the first ~60 lines of handler body, hands them to Claude Haiku 4.5 with a red-team system prompt, and asks for structured findings on untrusted-content flow into tool responses. One API call per scan, bounded at ~15K input tokens.

How to improve this grade

_Report generated by skillaudit.dev_

Want your repo audited?

First 100 audits go to waitlist signups in order. The engine runs against public GitHub URLs today.

Join the waitlist →