MCP Scanner
ScanLeaderboardDocsSign in
Home/Artin0123/gemini-image-mcp-server/Results
92A

gemini-vision-mcp

Artin0123/gemini-image-mcp-server

12 files · 3 findings

Share GitHub SARIF JSON
3 high
Tool Poisoningclean
Command Injectionclean
Path Traversalclean
SSRF1 issue
Credential Theft2 issues
Excessive Permissionsclean
Missing Authclean
Supply Chain
SSRF1

HTTP request with unvalidated URL parameter

high

Passing user-controlled variables directly to fetch, axios, or http.get without URL validation enables SSRF attacks.

src/gemini-media.ts:145
const response = await fetch(source.data);
How to fix

Validate and sanitize all URLs before making HTTP requests. Use an allowlist of permitted domains.

Credential Theft2

Dot-notation access to sensitive env vars

high

Accessing process.env properties like API_KEY, SECRET, TOKEN, or PASSWORD via dot notation may indicate credential harvesting.

src/index.ts:99
normalizedConfig.geminiApiKey ?? process.env.GEMINI_API_KEY?.trim();
How to fix

Avoid accessing sensitive env vars directly. Use a configuration module that validates and restricts access.

clean
Rug Pullclean
Data Exfiltrationclean

Dot-notation access to sensitive env vars

high

Accessing process.env properties like API_KEY, SECRET, TOKEN, or PASSWORD via dot notation may indicate credential harvesting.

src/index.ts:251
const envApiKey = process.env.GEMINI_API_KEY?.trim();
How to fix

Avoid accessing sensitive env vars directly. Use a configuration module that validates and restricts access.