MMacos Notification McpmacOS Notification MCP enables AI assistants to trigger native macOS sounds, visual notifications, and text-to-speech. Built for Claude and other AI models using the Model Context Protocol.
mcp-so:macos-notification-mcp_devizor
View sourceFirst Seen
Feb 19, 2026
Last Scanned
Feb 20, 2026
Findings
5
Score
42/100
Findings (5)
Detects patterns of downloading and piping to shell execution
curl
-LsSf
https://astral.sh/uv/install.sh
|
sh Download the file first, verify its integrity (checksum, signature), inspect it, then run it. Prefer package managers over raw downloads. Never fetch-and-run in one step.
Likely FP if the target is a well-known installer (e.g., rustup, Homebrew) from its canonical HTTPS domain, though the pattern is inherently risky.
Detects downloading scripts piped directly to a shell interpreter
curl
-LsSf
https://astral.sh/uv/install.sh
|
sh Download the script first, inspect it, verify its checksum, then run it. Do not pipe curl/wget output directly to sh/bash. Prefer package manager installs.
Likely FP if the download is from a well-known installer domain (e.g., brew.sh, rustup.rs), though this pattern is inherently risky even with trusted sources.
Detects git clone of repositories followed by execution of cloned content
git
clone https://github.com/devizor/macos-notification-mcp + cd
macos-notification-mcp
pip
install Review the dependency tree for nested or transitive dependencies that introduce risk. Use tools like npm audit or pip-audit to identify known vulnerabilities in the dependency chain.
Likely FP if the flagged dependency is a standard, widely-used library with no known vulnerabilities at the time of scanning.
Detects chained commands using shell operators with dangerous operations
curl
-LsSf
https://astral.sh/uv/install.sh
|
sh Break chained commands into discrete, individually validated steps. Avoid piping untrusted output directly into a shell interpreter.
Likely FP if the matched text is a documentation example showing a common installer one-liner for a well-known tool with a canonical URL.
Detects pip install of arbitrary packages that modify the host environment
pip
install
ma Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.
Likely FP if the match is in documentation showing how to install the skill's own PyPI package.