MMCP Resend EmailMCP server for sending email by Resend

mcp-so:mcp-resend-email_gdli6177

View source
C
52/100

First Seen

Feb 19, 2026

Last Scanned

Feb 20, 2026

Findings

10

Score

52/100

MEDIUM 6
LOW 4

Findings (10)

MEDIUM
CLI credential flags
L39

Detects command-line flags passing credentials with real-looking values

--api-key
=
your_resend_api_key
FIX

Remove credential values from CLI flags (e.g., --password, --token). Use environment variables, config files with restricted permissions, or interactive prompts instead.

FP?

Likely FP if the CLI flag is shown in a help text example (e.g., --token YOUR_TOKEN) without an actual credential value.

MEDIUM
CLI credential flags
L62

Detects command-line flags passing credentials with real-looking values

--api-key=your_resend_api_key"
FIX

Remove credential values from CLI flags (e.g., --password, --token). Use environment variables, config files with restricted permissions, or interactive prompts instead.

FP?

Likely FP if the CLI flag is shown in a help text example (e.g., --token YOUR_TOKEN) without an actual credential value.

MEDIUM
CLI credential flags
L89

Detects command-line flags passing credentials with real-looking values

--api-key=your_resend_api_key"
FIX

Remove credential values from CLI flags (e.g., --password, --token). Use environment variables, config files with restricted permissions, or interactive prompts instead.

FP?

Likely FP if the CLI flag is shown in a help text example (e.g., --token YOUR_TOKEN) without an actual credential value.

MEDIUM
CLI credential flags
L115

Detects command-line flags passing credentials with real-looking values

--api-key=your_resend_api_key"
FIX

Remove credential values from CLI flags (e.g., --password, --token). Use environment variables, config files with restricted permissions, or interactive prompts instead.

FP?

Likely FP if the CLI flag is shown in a help text example (e.g., --token YOUR_TOKEN) without an actual credential value.

MEDIUM
CLI credential flags
L163

Detects command-line flags passing credentials with real-looking values

--api-key=your_resend_api_key"
FIX

Remove credential values from CLI flags (e.g., --password, --token). Use environment variables, config files with restricted permissions, or interactive prompts instead.

FP?

Likely FP if the CLI flag is shown in a help text example (e.g., --token YOUR_TOKEN) without an actual credential value.

MEDIUM
CLI credential flags
L324

Detects command-line flags passing credentials with real-looking values

--api-key=your-resend-api-key"
FIX

Remove credential values from CLI flags (e.g., --password, --token). Use environment variables, config files with restricted permissions, or interactive prompts instead.

FP?

Likely FP if the CLI flag is shown in a help text example (e.g., --token YOUR_TOKEN) without an actual credential value.

LOW
npx MCP server without version pin
L53

Detects MCP server configs using npx to run packages without version pinning

"command"
:
"npx"
FIX

Pin the npx package in the MCP config to an exact version (e.g., @scope/server@1.2.3). Unpinned npx commands can silently fetch a compromised package version.

FP?

Likely FP if the MCP config is a local development setup example, though unpinned npx in production configs is a real supply chain risk.

LOW
npx MCP server without version pin
L80

Detects MCP server configs using npx to run packages without version pinning

"command"
:
"npx"
FIX

Pin the npx package in the MCP config to an exact version (e.g., @scope/server@1.2.3). Unpinned npx commands can silently fetch a compromised package version.

FP?

Likely FP if the MCP config is a local development setup example, though unpinned npx in production configs is a real supply chain risk.

LOW
npx MCP server without version pin
L154

Detects MCP server configs using npx to run packages without version pinning

"command"
:
"npx"
FIX

Pin the npx package in the MCP config to an exact version (e.g., @scope/server@1.2.3). Unpinned npx commands can silently fetch a compromised package version.

FP?

Likely FP if the MCP config is a local development setup example, though unpinned npx in production configs is a real supply chain risk.

LOW
npx MCP server without version pin
L321

Detects MCP server configs using npx to run packages without version pinning

"command": "npx"
FIX

Pin the npx package in the MCP config to an exact version (e.g., @scope/server@1.2.3). Unpinned npx commands can silently fetch a compromised package version.

FP?

Likely FP if the MCP config is a local development setup example, though unpinned npx in production configs is a real supply chain risk.