Server data from the Official MCP Registry
Scan installed MCP servers for security vulnerabilities with 16 detection engines.
Scan installed MCP servers for security vulnerabilities with 16 detection engines.
Set these up before or after installing:
Environment variable: MCPAMPEL_API_KEY
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-diemoeve-mcpampel": {
"env": {
"MCPAMPEL_API_KEY": "your-mcpampel-api-key-here"
},
"args": [
"mcpampel"
],
"command": "uvx"
}
}
}Clean, well-structured MCP security scanner with proper authentication handling and no significant security concerns. The server requires API keys, uses HTTPS by default, and handles credentials appropriately through environment variables. Minor quality improvements could be made around exception handling and input validation. Supply chain analysis found 3 known vulnerabilities in dependencies (0 critical, 3 high severity). Package verification found 1 issue.
Scanned 7 files · 8 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!