abacum-mcp-server

Abacum MCP Server

Python# Proprietary Software License for Abacum MCP Server **Copyright (c) 2025, Abacum. All rights reserved.** This software, including all source code, executables, and accompanying files (collectively, the "Software"), is the confidential and proprietary property of Abacum and its licensors. **1. Grant of Use:** This license grants Abacum a non-exclusive, non-transferable, royalty-free, perpetual license to: (a) Use the Software solely for Abacum's clients and internal business purposes. (b) Copy the Software only as necessary for deployment, backup, and internal testing required for Abacum's internal business operations. **2. Restrictions:** Except as expressly permitted by this license, Abacum is prohibited from: (a) Redistributing, sublicensing, leasing, selling, or otherwise transferring the Software or any copies thereof to any third party. (b) Modifying, adapting, reverse engineering, de-compiling, disassembling, or creating derivative works of the Software. (c) Allowing any party outside of Abacum to access, view, or utilize the source code or executables. **3. No Warranty:** The Software is provided "AS IS," without warranty of any kind, express or implied. Abacum disclaims all warranties, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
0Tools
1Findings
Mar 19, 2026Last Scanned

Security Category Deep Dive

Prompt Injection
Prompt & context manipulation attacks
69
Maturity
14
Rules
5
Sub-Categories
1
Gaps
64%
Implemented
56
Tests
1
Stories
PI-DIRDirect Input Injection
100%3 rules
Injection via tool descriptions and parameter fields
GAP-001Prompt Injection Coverage GapMissing detection coverage for emerging prompt injection attack variants not addressed by current rules
PI-INDIndirect / Gateway Injection
100%4 rules
Hidden instructions via external content and tool responses
PI-CTXContext Manipulation
100%2 rules
Context window saturation and prior-approval exploitation
PI-ENCEncoding & Obfuscation
100%3 rules
Payload hiding via invisible chars, base64, schema fields
PI-TPLTemplate & Output Poisoning
100%2 rules
Injection via prompt templates and runtime tool output
Framework Coverage
OWASP MCP Top 1014/14
MITRE ATLAS14/14
CoSAI MCP2/14
OWASP Agentic Top 1012/14
Kill Chain Phases
0Initial Access
0Defense Evasion
0Execution
0Persistence