abacum-mcp-server

Abacum MCP Server

Python# Proprietary Software License for Abacum MCP Server **Copyright (c) 2025, Abacum. All rights reserved.** This software, including all source code, executables, and accompanying files (collectively, the "Software"), is the confidential and proprietary property of Abacum and its licensors. **1. Grant of Use:** This license grants Abacum a non-exclusive, non-transferable, royalty-free, perpetual license to: (a) Use the Software solely for Abacum's clients and internal business purposes. (b) Copy the Software only as necessary for deployment, backup, and internal testing required for Abacum's internal business operations. **2. Restrictions:** Except as expressly permitted by this license, Abacum is prohibited from: (a) Redistributing, sublicensing, leasing, selling, or otherwise transferring the Software or any copies thereof to any third party. (b) Modifying, adapting, reverse engineering, de-compiling, disassembling, or creating derivative works of the Software. (c) Allowing any party outside of Abacum to access, view, or utilize the source code or executables. **3. No Warranty:** The Software is provided "AS IS," without warranty of any kind, express or implied. Abacum disclaims all warranties, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
0Tools
1Findings
Stars
Downloads
Mar 19, 2026Last Scanned

Findings1

0critical
0high
0medium
1low
0informational
lowF4MCP Spec Non-ComplianceMCP07-insecure-config
Server fails MCP spec compliance checks: required:server_name; required:server_version; required:protocol_version; recommended:tool_descriptions; recommended:parameter_descriptions
Follow the MCP specification for server metadata. Include server name, version, and protocol version. Provide descriptions for all tools and parameters.

Tools

No tools exposed by this server.

Security Category Deep Dive

Sub-Category Tree · Remediation Roadmap · Attack Stories · Compliance Overlay · ATLAS Techniques · Maturity Model

Prompt Injection
Prompt & context manipulation attacks
69
Maturity
14
Rules
5
Sub-Categories
1
Gaps
64%
Implemented
56
Tests
1
Stories
PI-DIRDirect Input Injection
100%3 rules
Injection via tool descriptions and parameter fields
GAP-001Prompt Injection Coverage GapMissing detection coverage for emerging prompt injection attack variants not addressed by current rules
PI-INDIndirect / Gateway Injection
100%4 rules
Hidden instructions via external content and tool responses
PI-CTXContext Manipulation
100%2 rules
Context window saturation and prior-approval exploitation
PI-ENCEncoding & Obfuscation
100%3 rules
Payload hiding via invisible chars, base64, schema fields
PI-TPLTemplate & Output Poisoning
100%2 rules
Injection via prompt templates and runtime tool output
Framework Coverage
OWASP MCP Top 1014/14
MITRE ATLAS14/14
CoSAI MCP2/14
OWASP Agentic Top 1012/14
Kill Chain Phases
0Initial Access
0Defense Evasion
0Execution
0Persistence