DDeep ResearchA Model Context Protocol (MCP) compliant server designed for comprehensive web research. It uses Tavily's Search and Crawl APIs to gather detailed information on a given topic, then structures this data in a format perfect for LLMs to create high-quality markdown documents.

mcp-so:deep-research_Pink Pixel

View source
C
67/100

First Seen

Feb 19, 2026

Last Scanned

Feb 20, 2026

Findings

5

Score

67/100

CRITICAL 1
MEDIUM 1
LOW 3

Findings (5)

CRITICAL
Instruction override combined with dangerous operations
L23

Instruction override combined with dangerous operations

research-assistant
A Model Context Protocol (MCP) compliant server designed for comprehensive web research. It uses Tavily's Search and Crawl APIs to gather detailed information on a given topic, then...
FIX

Remove language that attempts to override safety guidelines or bypass system-level controls. This pattern is a strong indicator of a jailbreak attempt.

FP?

Likely FP if the matched text is in a security research document or educational content clearly marked as an example rather than an active payload.

MEDIUM
Auto-confirm flag bypassing user verification
L156

Detects -y, --yes, or --auto-approve flags in MCP/skill install commands that bypass user confirmation

"-y"
FIX

Remove the -y/--yes auto-confirm flag from MCP server launch arguments. This flag bypasses user confirmation prompts and allows unattended execution of potentially dangerous operations.

FP?

Likely FP if the matched text is an isolated flag (-y or --yes) in documentation describing command-line options, not in an actual MCP config.

LOW
Unverified npx package execution
L102

Detects npx executing packages from unverified sources without pinned versions

npx @pinkpixel/deep-research-mcp
FIX

Pin the npx package to an exact version (e.g., npx @scope/package@1.2.3). Unversioned npx commands can silently install a different or malicious package version.

FP?

Likely FP if the npx command targets a well-known package in documentation context, though unpinned versions are a real supply chain concern.

LOW
npx MCP server without version pin
L154

Detects MCP server configs using npx to run packages without version pinning

"command": "npx"
FIX

Pin the npx package in the MCP config to an exact version (e.g., @scope/server@1.2.3). Unpinned npx commands can silently fetch a compromised package version.

FP?

Likely FP if the MCP config is a local development setup example, though unpinned npx in production configs is a real supply chain risk.

LOW
Hardcoded secrets in MCP env block
L159

Detects hardcoded API keys, tokens, or passwords in MCP server environment configuration

"env": { + "TAVILY_API_KEY": "tvly-YOUR_ACTUAL_API_KEY_HERE"
FIX

Remove shell metacharacters (semicolons, pipes, ampersands, backticks) from MCP server arguments. Use explicit argument arrays and avoid shell expansion in MCP configurations.

FP?

Likely FP if the metacharacter is a literal part of a non-shell argument (e.g., a regex pattern or a URL query parameter containing ampersands).