Is "@sirrlock/mcp" on MCP Registry Safe to Install?

GitHub Actions · mcp · v1.0.34

Sirr MCP server — lets Claude Code read and write ephemeral secrets

Risk Assessment

Analyzed
0
out of 100
MINIMAL

0 security findings detected across all analyzers

MCP server analyzed for tool poisoning, prompt injection, and data exfiltration

No Threats Detected

This extension passed all security checks

About This Extension

Sirr MCP server — lets Claude Code read and write ephemeral secrets

No Findings

All security checks passed

Security Analysis Summary

Security Analysis Overview

@sirrlock/mcp is a mcp extension published by GitHub Actions. Version 1.0.34 has been analyzed by the Risky Plugins security platform, receiving a risk score of 0/100 (MINIMAL risk) based on 0 security findings.

Risk Assessment

This extension presents minimal security concerns. The automated analysis found very few or no issues, suggesting it is suitable for general use.

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

@sirrlock/mcp is published by GitHub Actions on the mcp marketplace.

Recommendation

Based on the automated security analysis, this extension appears safe for general use. As with any extension, users should review the requested permissions before installation.

Frequently Asked Questions