02-sops

mcp plugin skill install security review sop

Fri May 01 2026 20:00:00 GMT-0400 (Eastern Daylight Time) ·sop ·status: active
securitymcppluginskillinstall-reviewprompt-injection-defense

SOP: Security review for MCP / plugin / skill installs

Trigger: any time founder asks Ray to install an MCP server, Claude Code plugin, or skill from a non-RDCO source. Run this BEFORE installing — even if founder doesn’t explicitly request a security review.

Why this is standard: founder confirmed 2026-05-02 21:42 ET that this should be the default behavior, not request-gated. The Lazyweb review (~/rdco-vault/04-tooling/2026-05-02-lazyweb-mcp-security-review-decision.md) demonstrated that prompt-injection vectors are now appearing in routine tool responses + hosted-install-prompt URLs are mutable in ways that defeat one-time review. Default-on review prevents the foot-gun.

When to invoke

Always invoke for:

Skip for:

The review checklist

Spawn a security-review sub-agent with the following 6-step protocol. Cap at 25-30 minutes.

Step 1 — Identify the install path

Step 2 — Inspect the source repo

Step 3 — Token / credential analysis

Step 4 — Trust signals on maintainer

Step 5 — Worst-case blast radius

Step 6 — Verdict + report

One of:

For INSTALL-WITH-MITIGATIONS, list the specific mitigations.

For DON’T-INSTALL or NEED-MORE-INFO, surface to founder before proceeding.

What to return to the founder

Tight summary (chunked into <400 word iMessage segments per the long-message delivery bug):

  1. Verdict with one-line rationale
  2. Token mechanism in 1-2 sentences (the standard “what is the token” answer)
  3. 3 specific safety findings (concrete, code-cited if possible)
  4. Worst-case blast radius if compromised
  5. Whether the install command involves a hosted-install-prompt URL that’s a mutation vector
  6. Honest benefit assessment — does RDCO actually need this? Comparison to existing tools.

What to NEVER do during a security review

After the verdict

Cross-references

Changelog