source code not available for this server
99 rulesTo unblock: give us a fetchable source URL.
J5Tool Output Poisoning PatternsN12Resource Subscription Content MutationN9MCP Logging Protocol InjectionN4JSON-RPC Error Object InjectionK12Executable Content in Tool ResponseK13Unsanitized Tool OutputL15Update Notification SpoofingK10Package Registry SubstitutionL10Registry Metadata SpoofingC1Command InjectionJ2Git Argument InjectionC9Excessive Filesystem ScopeC16Dynamic Code Evaluation with User InputC12Unsafe DeserializationC13Server-Side Template Injection (SSTI)C4SQL InjectionC10Prototype PollutionC2Path TraversalC3Server-Side Request Forgery (SSRF)C5Hardcoded Secrets in Source CodeC14JWT Algorithm Confusion / None Algorithm AttackC15Timing Attack on Secret or Token ComparisonC6Error Message Information LeakageC7Wildcard CORS ConfigurationC8No Authentication on Network-Exposed ServerC11ReDoS — Catastrophic Regex BacktrackingJ7OpenAPI Specification Field InjectionL2Malicious Build Plugin InjectionL12Build Artifact TamperingG7DNS-Based Data Exfiltration ChannelK18Cross-Trust-Boundary Data Flow in Tool ResponseO5Environment Variable HarvestingO6Server Fingerprinting via Error ResponsesO8Timing-Based Covert ChannelO9Ambient Credential ExploitationO10Privacy-Violating TelemetryO4Clipboard and UI Exfiltration InjectionK8Cross-Boundary Credential SharingH1MCP OAuth 2.0 Insecure ImplementationK6Overly Broad OAuth ScopesK7Long-Lived Tokens Without RotationK14Agent Credential Propagation via Shared StateI15Transport Session SecurityN14Trust-On-First-Use Bypass (TOFU)K11Missing Server Integrity VerificationK9Dangerous Post-Install HooksL3Dockerfile Base Image Supply Chain RiskL6Config Directory Symlink AttackL8Version Rollback / Downgrade AttackP5Secrets Exposed in Container Build LayersL1GitHub Actions Tag PoisoningL9CI/CD Secret Exfiltration PatternsL13Build Credential File TheftL5Package Manifest Confusion IndicatorsL7Transitive MCP Server DelegationL14Hidden Entry Point MismatchL4MCP Config File Code InjectionL11Environment Variable Injection via MCP ConfigQ4IDE MCP Configuration InjectionQ13MCP Bridge Package Supply Chain AttackJ1Cross-Agent Configuration PoisoningK5Auto-Approve / Bypass Confirmation PatternI12Capability Escalation Post-InitializationM6Progressive Context Poisoning EnablersQ15A2A/MCP Protocol Boundary ConfusionK1Absent Structured LoggingK2Audit Trail DestructionK3Audit Log TamperingK20Insufficient Audit Context in LoggingN1JSON-RPC Batch Request AbuseN2JSON-RPC Notification FloodingN3JSON-RPC Request ID CollisionN8Cancellation Race ConditionN10Incomplete Handshake Denial of ServiceK16Unbounded Recursion / Missing Depth LimitsN5Capability Downgrade DeceptionN11Protocol Version Downgrade AttackN15JSON-RPC Method Name ConfusionN6SSE Reconnection HijackingN7Progress Token Prediction and InjectionN13HTTP Chunked Transfer SmugglingQ3Localhost MCP Service HijackingK17Missing Timeout or Circuit BreakerK19Missing Runtime Sandbox EnforcementP9Missing Container Resource LimitsM7Tool Response Structure BombM8Inference Cost AmplificationP1Docker Socket Mount in ContainerP2Dangerous Container CapabilitiesP6LD_PRELOAD and Shared Library HijackingP7Sensitive Host Filesystem MountP10Host Network Mode and Missing Egress ControlsP3Cloud Metadata Service AccessP4TLS Certificate Validation BypassP8Insecure Cryptographic Mode or Static IV/NonceQ7Desktop Extension Privilege ChainM2TokenBreak Boundary ManipulationM9Model-Specific System Prompt ExtractionJ4Health Endpoint Information Disclosure