MCP Scanner
ScanLeaderboardDocsSign in
Home/embeddedlayers/mcp-analytics/Results
90A

mcp-analytics

embeddedlayers/mcp-analytics

15 files · 2 findings

Share GitHub SARIF JSON
1 high1 medium
Tool Poisoningclean
Command Injectionclean
Path Traversalclean
SSRF1 issue
Credential Theft1 issue
Excessive Permissionsclean
Missing Authclean
Supply Chain
SSRF1

URL construction from user input

medium

Building URLs by concatenating or interpolating user input without an allowlist check enables SSRF via host manipulation.

src/index.js:73
new URL(`${API_URL}/mcp/api-key`),
How to fix

Do not construct URLs from unvalidated user input. Use a URL allowlist or domain restriction.

Credential Theft1

Dot-notation access to sensitive env vars

high

Accessing process.env properties like API_KEY, SECRET, TOKEN, or PASSWORD via dot notation may indicate credential harvesting.

src/index.js:37
const API_KEY = process.env.MCP_ANALYTICS_API_KEY || "";
How to fix

Avoid accessing sensitive env vars directly. Use a configuration module that validates and restricts access.

clean
Rug Pullclean
Data Exfiltrationclean