moltbook-search

clawhub:moltbook-search

View source
A
100/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

4

Score

100/100

LOW 4

Findings (4)

LOW
Non-localhost remote MCP server URL
L139

Detects MCP server configurations connecting to non-localhost remote URLs

"url": "https://moltbook.com/submolt/general/post/fcf391a8"
FIX

Change the MCP server URL to localhost or a trusted internal endpoint. If a remote server is required, verify the domain ownership and use HTTPS with certificate validation.

FP?

Likely FP if the URL points to example.com, a documentation domain, or a well-known SaaS API endpoint (e.g., api.openai.com).

LOW
Non-localhost remote MCP server URL
L214

Detects MCP server configurations connecting to non-localhost remote URLs

"url": "https://moltbook.com/..."
FIX

Change the MCP server URL to localhost or a trusted internal endpoint. If a remote server is required, verify the domain ownership and use HTTPS with certificate validation.

FP?

Likely FP if the URL points to example.com, a documentation domain, or a well-known SaaS API endpoint (e.g., api.openai.com).

LOW
Mutable GitHub raw content reference
L315

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/geeks-accelerator/essence-router/blob/main/docs/plans/moltbook-full-proxy.md)).
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
External API response used without validation
L438

Detects patterns where external API responses are used directly without validation or sanitization

API calls to handle 429 rate limit response + directly
2. Use
FIX

Validate and sanitize all data received from external APIs before using it in tool operations or agent prompts. Implement schema validation and treat API responses as untrusted input.

FP?

Likely FP if the match is a truncated table cell or documentation fragment that mentions API responses in a descriptive context, not actual unvalidated data processing.