First Seen
Feb 18, 2026
Last Scanned
Feb 20, 2026
Findings
2
Score
92/100
Findings (2)
Detects patterns where credential or secret reads are combined with external data transmission
access credential + Upload experimental data Prevent credentials and sensitive data obtained by one MCP tool from being passed to other tools. Implement data isolation between tools and restrict cross-tool data flow for secrets.
Likely FP if the cross-tool data flow is intentional API authentication (e.g., a tool fetches an auth token that another tool uses for the same service).
Detects git clone of repositories followed by execution of cloned content
git clone https://github.com/mcmero/labarchives-py + pip install . Review the dependency tree for nested or transitive dependencies that introduce risk. Use tools like npm audit or pip-audit to identify known vulnerabilities in the dependency chain.
Likely FP if the flagged dependency is a standard, widely-used library with no known vulnerabilities at the time of scanning.