Server data from the Official MCP Registry
MCP server for Taco Bell - browse menu, customize orders, place pickup
MCP server for Taco Bell - browse menu, customize orders, place pickup
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-markswendsen-code-tacobell": {
"args": [
"-y",
"@striderlabs/mcp-tacobell"
],
"command": "npx"
}
}
}This Taco Bell MCP server poses significant security risks due to hardcoded authentication credentials, lack of input validation, and dangerous permissions including arbitrary file system access and shell execution via Playwright. The server can potentially be exploited for credential theft and unauthorized system access. Supply chain analysis found 3 known vulnerabilities in dependencies (0 critical, 3 high severity). Package verification found 1 issue.
Scanned 3 files · 10 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!