No findings on file

153 rules tested cleanly. 10 rules need more context — see below.

Test 10 more rules — give us more context2 input gaps
Dependency manifest7 rules

To unlock these tests: expose your package manifest.

  • D1Known CVEs in DependenciesSupply Chain SecurityKnown Vulnerable Dependencies
  • D2Abandoned DependenciesSupply Chain SecurityKnown Vulnerable Dependencies
  • D3Typosquatting Risk in DependenciesSupply Chain SecurityMalicious & Typosquat Packages
  • D4Excessive Dependency CountSupply Chain SecurityKnown Vulnerable Dependencies
  • D5Known Malicious or Flagged PackageSupply Chain SecurityMalicious & Typosquat Packages
  • D6Weak or Deprecated Cryptography DependenciesCode VulnerabilitiesInsecure Credential & Crypto
  • D7Dependency Confusion Attack RiskSupply Chain SecurityMalicious & Typosquat Packages
Live connection3 rules

To unlock these tests: register a live MCP endpoint.

  • E1No Authentication RequiredCode VulnerabilitiesServer-Hardening Failures
  • E2Insecure TransportAuthentication & IdentitySession & Transport Security
  • E3Response Time AnomalyAudit & LoggingAbsent or Unstructured Logging

Tested cleanly

  • Prompt Injection24 rules tested cleanly
  • Tool Poisoning17 rules tested cleanly
  • Code Vulnerabilities23 rules tested cleanly
  • Data Exfiltration15 rules tested cleanly
  • Authentication & Identity9 rules tested cleanly
  • Supply Chain Security23 rules tested cleanly
  • Human Oversight6 rules tested cleanly
  • Audit & Logging5 rules tested cleanly
  • Multi-Agent Security1 rule tested cleanly
  • Protocol & Transport15 rules tested cleanly
  • Denial of Service7 rules tested cleanly
  • Container & Runtime10 rules tested cleanly
  • Model Manipulation8 rules tested cleanly
mcp-server-macos-use security findings — MCP Sentinel