SSynterMCP server for AI agents to manage ad campaigns across Google, Meta, LinkedIn, Microsoft, Reddit, TikTok, and more. Create campaigns, pull performance data, generate AI creatives, and optimize budgets. Also, for conversion tracking, google analytics, posthog, hubspot, salesforce.com, stripe, and more.
mcp-so:synter_jshorwitz
View sourceFirst Seen
Feb 19, 2026
Last Scanned
Feb 20, 2026
Findings
5
Score
75/100
Findings (5)
Instruction override combined with dangerous operations
Use run_tool to call google_ads_list_audiences
See the full tool list at
docs.syntermedia.ai/tools
or ask your agent:
What tools are available for LinkedIn Ads?
Environment Variables
Variable
Required... Remove language that attempts to override safety guidelines or bypass system-level controls. This pattern is a strong indicator of a jailbreak attempt.
Likely FP if the matched text is in a security research document or educational content clearly marked as an example rather than an active payload.
Detects MCP server configs using npx to run packages without version pinning
"command"
:
"npx" Pin the npx package in the MCP config to an exact version (e.g., @scope/server@1.2.3). Unpinned npx commands can silently fetch a compromised package version.
Likely FP if the MCP config is a local development setup example, though unpinned npx in production configs is a real supply chain risk.
Detects hardcoded API keys, tokens, or passwords in MCP server environment configuration
"env"
:
{ + "SYNTER_API_KEY"
:
"syn_your_api_key_here" Remove shell metacharacters (semicolons, pipes, ampersands, backticks) from MCP server arguments. Use explicit argument arrays and avoid shell expansion in MCP configurations.
Likely FP if the metacharacter is a literal part of a non-shell argument (e.g., a regex pattern or a URL query parameter containing ampersands).
Detects MCP server configs using npx to run packages without version pinning
"command"
:
"npx" Pin the npx package in the MCP config to an exact version (e.g., @scope/server@1.2.3). Unpinned npx commands can silently fetch a compromised package version.
Likely FP if the MCP config is a local development setup example, though unpinned npx in production configs is a real supply chain risk.
Detects MCP server configs using npx to run packages without version pinning
"command"
:
"npx" Pin the npx package in the MCP config to an exact version (e.g., @scope/server@1.2.3). Unpinned npx commands can silently fetch a compromised package version.
Likely FP if the MCP config is a local development setup example, though unpinned npx in production configs is a real supply chain risk.