Automated Survey Creation via MCP

AI-Moderated Interviews & Surveys via MCP (feedbk.ai) Create smarter surveys and conduct AI-moderated interviews with dynamic follow-up probing — all directly from your AI assistant. Feedbk MCP lets you design, launch, and share interviews using natural language. No survey builders, no manual logic trees. Just describe what you want to learn, and the AI handles the rest. Why Feedbk MCP? Feedbk MCP brings AI-powered interview and survey creation directly into your workflow: • ✅ Natural language interview design — simply describe your research goal • ✅ Automatic question type detection — no manual configuration needed • ✅ AI-moderated probing — adaptive follow-ups for deeper insights • ✅ Instant sharing — generate interview links and send to participants immediately Perfect for product research, customer feedback, UX studies, and discovery interviews.

ai-ml
0Tools
1Findings
Stars
Downloads
Mar 19, 2026Last Scanned

Findings1

0critical
0high
0medium
1low
0informational
lowF4MCP Spec Non-ComplianceMCP07-insecure-config
Server fails MCP spec compliance checks: required:server_name; required:server_version; required:protocol_version; recommended:tool_descriptions; recommended:parameter_descriptions
Follow the MCP specification for server metadata. Include server name, version, and protocol version. Provide descriptions for all tools and parameters.

Tools

No tools exposed by this server.

Security Category Deep Dive

Sub-Category Tree · Remediation Roadmap · Attack Stories · Compliance Overlay · ATLAS Techniques · Maturity Model

Prompt Injection
Prompt & context manipulation attacks
69
Maturity
14
Rules
5
Sub-Categories
1
Gaps
64%
Implemented
56
Tests
1
Stories
PI-DIRDirect Input Injection
100%3 rules
Injection via tool descriptions and parameter fields
GAP-001Prompt Injection Coverage GapMissing detection coverage for emerging prompt injection attack variants not addressed by current rules
PI-INDIndirect / Gateway Injection
100%4 rules
Hidden instructions via external content and tool responses
PI-CTXContext Manipulation
100%2 rules
Context window saturation and prior-approval exploitation
PI-ENCEncoding & Obfuscation
100%3 rules
Payload hiding via invisible chars, base64, schema fields
PI-TPLTemplate & Output Poisoning
100%2 rules
Injection via prompt templates and runtime tool output
Framework Coverage
OWASP MCP Top 1014/14
MITRE ATLAS14/14
CoSAI MCP2/14
OWASP Agentic Top 1012/14
Kill Chain Phases
0Initial Access
0Defense Evasion
0Execution
0Persistence