mcporter
Warn
Audited by Snyk on Feb 15, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). Yes — the CLI explicitly supports calling arbitrary URLs and running stdio scrapers (e.g., "mcporter call https://api.example.com/mcp.fetch url:https://example.com" and "mcporter call --stdio 'bun run ./server.ts' scrape url=https://example.com"), which ingests untrusted public/web or user-provided content that could carry indirect prompt injection.
Audit Metadata