leanmcp-builder
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The
package.jsonfile uses thelatesttag for@leanmcp/coreand@leanmcp/cli. This practice is unverifiable and allows for the automatic ingestion of potentially malicious updates from an untrusted publisher. - [DATA_EXFILTRATION] (HIGH): The documentation in
references/decorators.mdprovides a template for a tool (callApi) that takes a user-controlledendpointstring and performs afetchrequest to it while including sensitive headers (X-API-Key). This pattern is a textbook example of SSRF that enables an attacker to exfiltrate secret environment variables to a remote server. - [DATA_EXFILTRATION] (MEDIUM): The server is configured with
cors: trueand runs on a static port (3001) inassets/main.ts. While standard for development, this increases the attack surface for Cross-Site Request Forgery (CSRF) or unauthorized access if deployed in an insecure environment.
Recommendations
- AI detected serious security threats
Audit Metadata