Is "@iflow-mcp/iamrichardd-mcp-server-pinescript" on MCP Registry Safe to Install?

chatflowdev · mcp · v3.3.23

AI-optimized MCP server for PineScript documentation and code review

Risk Assessment

Analyzed
100
out of 100
CRITICAL

478 security findings detected across all analyzers

MCP server analyzed for tool poisoning, prompt injection, and data exfiltration

Severity Breakdown

91
Critical
126
High
220
Medium
0
Low
0
Info

Finding Categories

125
Malware Signatures
1
Obfuscation
194
IoC Indicators

YARA Rules Matched

12 rules(125 hits)
postinstall obfuscation postinstall network communication postinstall crypto operations postinstall persistence mechanism postinstall system command postinstall registry modification postinstall file manipulation postinstall file download UsingCommandLineArguments credential env files postinstall environment access UsingShellInterpreterWhenExecutingOSCommands

MCP Server Analysis

MCP servers expose tools and resources to AI assistants. Unlike browser extensions, they run as standalone processes with direct system access. Tool definitions are analyzed for prompt injection, data exfiltration, and tool poisoning patterns.

About This Extension

AI-optimized MCP server for PineScript documentation and code review

Detailed Findings

278 total

YARA Rule Matches

12 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
17
IP Addresses
10
Domains
175
Strings
194

All Indicators · 194

Domain
detected Domain: this.is

XIOC detected Domain: this.is

extracted_from_files

Domain
detected Domain: ninput.int

XIOC detected Domain: ninput.int

extracted_from_files

Domain
detected Domain: labelslabel.new

XIOC detected Domain: labelslabel.new

extracted_from_files

URL
detected URL: https://www.tradingview.com/pine-script-reference/v6/op_%5B%5D)

XIOC detected URL: https://www.tradingview.com/pine-script-reference/v6/op_%5B%5D)

extracted_from_files

URL
detected URL: https://mozilla.org/MPL/2.0/

XIOC detected URL: https://mozilla.org/MPL/2.0/

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://github.com/iamrichardD/mcp-server-pinescript.git

XIOC detected URL: https://github.com/iamrichardD/mcp-server-pinescript.git

extracted_from_files

URL
detected URL: https://keepachangelog.com/en/1.0.0/),

XIOC detected URL: https://keepachangelog.com/en/1.0.0/),

extracted_from_files

URL
detected URL: https://semver.org/spec/v2.0.0.html).

XIOC detected URL: https://semver.org/spec/v2.0.0.html).

extracted_from_files

URL
detected URL: https://example.com/new-docs';

XIOC detected URL: https://example.com/new-docs';

extracted_from_files

URL
detected URL: https://www.tradingview.com/pine-script-reference/v7';

XIOC detected URL: https://www.tradingview.com/pine-script-reference/v7';

extracted_from_files

URL
detected URL: https://firecrawl.dev/

XIOC detected URL: https://firecrawl.dev/

extracted_from_files

Domain
detected Domain: expr.property.name

XIOC detected Domain: expr.property.name

extracted_from_files

Domain
detected Domain: parametervalue.name

XIOC detected Domain: parametervalue.name

extracted_from_files

Domain
detected Domain: memberexpr.name

XIOC detected Domain: memberexpr.name

extracted_from_files

Domain
detected Domain: memberexpr.property.name

XIOC detected Domain: memberexpr.property.name

extracted_from_files

Domain
detected Domain: testcase.name

XIOC detected Domain: testcase.name

extracted_from_files

Domain
detected Domain: testresult.name

XIOC detected Domain: testresult.name

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Domain
detected Domain: udt.new

XIOC detected Domain: udt.new

extracted_from_files

Domain
detected Domain: stmt.name

XIOC detected Domain: stmt.name

extracted_from_files

Domain
detected Domain: funccall.name

XIOC detected Domain: funccall.name

extracted_from_files

Domain
detected Domain: valueexpr.name

XIOC detected Domain: valueexpr.name

extracted_from_files

Domain
detected Domain: param.name

XIOC detected Domain: param.name

extracted_from_files

Domain
detected Domain: expr.name

XIOC detected Domain: expr.name

extracted_from_files

Domain
detected Domain: expr.object.name

XIOC detected Domain: expr.object.name

extracted_from_files

Domain
detected Domain: deploy-validate.sh

XIOC detected Domain: deploy-validate.sh

extracted_from_files

Domain
detected Domain: astresult.violations.map

XIOC detected Domain: astresult.violations.map

extracted_from_files

Domain
detected Domain: node.name

XIOC detected Domain: node.name

extracted_from_files

Domain
detected Domain: this.na

XIOC detected Domain: this.na

extracted_from_files

Domain
detected Domain: declarations.map

XIOC detected Domain: declarations.map

extracted_from_files

Domain
detected Domain: implementation-guide.md

XIOC detected Domain: implementation-guide.md

extracted_from_files

Domain
detected Domain: functionsignaturevalidationresult.violations.map

XIOC detected Domain: functionsignaturevalidationresult.violations.map

extracted_from_files

URL
detected URL: https://www.tradingview.com/pine-script-docs/language/operators/-history-referencing-operator).

XIOC detected URL: https://www.tradingview.com/pine-script-docs/language/operators/-history-referencing-operator).

extracted_from_files

URL
detected URL: https://github.com/iamrichardD/mcp-server-pinescript/issues

XIOC detected URL: https://github.com/iamrichardD/mcp-server-pinescript/issues

extracted_from_files

Domain
detected Domain: bar.new

XIOC detected Domain: bar.new

extracted_from_files

Domain
detected Domain: bardata.new

XIOC detected Domain: bardata.new

extracted_from_files

Domain
detected Domain: loop.int

XIOC detected Domain: loop.int

extracted_from_files

Domain
detected Domain: point.new

XIOC detected Domain: point.new

extracted_from_files

Domain
detected Domain: build-automation.sh

XIOC detected Domain: build-automation.sh

extracted_from_files

Domain
detected Domain: linesline.new

XIOC detected Domain: linesline.new

extracted_from_files

Domain
detected Domain: strategy.opentrades.capital

XIOC detected Domain: strategy.opentrades.capital

extracted_from_files

Domain
detected Domain: syminfo.country

XIOC detected Domain: syminfo.country

extracted_from_files

Domain
detected Domain: syminfo.target

XIOC detected Domain: syminfo.target

extracted_from_files

Domain
detected Domain: tablestable.new

XIOC detected Domain: tablestable.new

extracted_from_files

Domain
detected Domain: display.data

XIOC detected Domain: display.data

extracted_from_files

Domain
detected Domain: shape.circle

XIOC detected Domain: shape.circle

extracted_from_files

Domain
detected Domain: price.int

XIOC detected Domain: price.int

extracted_from_files

Domain
detected Domain: strategy.cash

XIOC detected Domain: strategy.cash

extracted_from_files

Domain
detected Domain: ta.dev

XIOC detected Domain: ta.dev

extracted_from_files

Domain
detected Domain: backadjustment.off

XIOC detected Domain: backadjustment.off

extracted_from_files

Domain
detected Domain: close.off

XIOC detected Domain: close.off

extracted_from_files

Domain
detected Domain: values.map

XIOC detected Domain: values.map

extracted_from_files

Domain
detected Domain: request.financial

XIOC detected Domain: request.financial

extracted_from_files

Domain
detected Domain: ticker.new

XIOC detected Domain: ticker.new

extracted_from_files

URL
detected URL: https://www.tradingview.com/pine-script-reference/v6/op_%5B%5D),

XIOC detected URL: https://www.tradingview.com/pine-script-reference/v6/op_%5B%5D),

extracted_from_files

Domain
detected Domain: 1.3label.new

XIOC detected Domain: 1.3label.new

extracted_from_files

Domain
detected Domain: 1label.new

XIOC detected Domain: 1label.new

extracted_from_files

Domain
detected Domain: 1.34label.new

XIOC detected Domain: 1.34label.new

extracted_from_files

Domain
detected Domain: ta.tr

XIOC detected Domain: ta.tr

extracted_from_files

Domain
detected Domain: ninfolabel.new

XIOC detected Domain: ninfolabel.new

extracted_from_files

Domain
detected Domain: nlog.info

XIOC detected Domain: nlog.info

extracted_from_files

Domain
detected Domain: chart.int

XIOC detected Domain: chart.int

extracted_from_files

Domain
detected Domain: open-ta.tr

XIOC detected Domain: open-ta.tr

extracted_from_files

Domain
detected Domain: polyline.new

XIOC detected Domain: polyline.new

extracted_from_files

Domain
detected Domain: hline.style

XIOC detected Domain: hline.style

extracted_from_files

Domain
detected Domain: linefill.new

XIOC detected Domain: linefill.new

extracted_from_files

Domain
detected Domain: xloc.bar

XIOC detected Domain: xloc.bar

extracted_from_files

Domain
detected Domain: pivotpoint.new

XIOC detected Domain: pivotpoint.new

extracted_from_files

Domain
detected Domain: barinfo.new

XIOC detected Domain: barinfo.new

extracted_from_files

Domain
detected Domain: counter.new

XIOC detected Domain: counter.new

extracted_from_files

Domain
detected Domain: nthis.info

XIOC detected Domain: nthis.info

extracted_from_files

Domain
detected Domain: this.info

XIOC detected Domain: this.info

extracted_from_files

Domain
detected Domain: infolabel.new

XIOC detected Domain: infolabel.new

extracted_from_files

Domain
detected Domain: nxloc.bar

XIOC detected Domain: nxloc.bar

extracted_from_files

Domain
detected Domain: nchart.point.now

XIOC detected Domain: nchart.point.now

extracted_from_files

Domain
detected Domain: narray.new

XIOC detected Domain: narray.new

extracted_from_files

Domain
detected Domain: nrequest.security

XIOC detected Domain: nrequest.security

extracted_from_files

Domain
detected Domain: location.top

XIOC detected Domain: location.top

extracted_from_files

URL
detected URL: https://github.com/anthropics/claude-code)

XIOC detected URL: https://github.com/anthropics/claude-code)

extracted_from_files

Domain
detected Domain: line.search

XIOC detected Domain: line.search

extracted_from_files

Domain
detected Domain: log.info

XIOC detected Domain: log.info

extracted_from_files

Domain
detected Domain: nlinefill.new

XIOC detected Domain: nlinefill.new

extracted_from_files

Domain
detected Domain: nbox.new

XIOC detected Domain: nbox.new

extracted_from_files

Domain
detected Domain: npolyline.new

XIOC detected Domain: npolyline.new

extracted_from_files

Domain
detected Domain: ntable.new

XIOC detected Domain: ntable.new

extracted_from_files

Domain
detected Domain: chart.point.new

XIOC detected Domain: chart.point.new

extracted_from_files

Domain
detected Domain: chart.point.now

XIOC detected Domain: chart.point.now

extracted_from_files

Domain
detected Domain: m.is

XIOC detected Domain: m.is

extracted_from_files

Domain
detected Domain: position.top

XIOC detected Domain: position.top

extracted_from_files

Domain
detected Domain: nchart.bg

XIOC detected Domain: nchart.bg

extracted_from_files

Domain
detected Domain: nchart.is

XIOC detected Domain: nchart.is

extracted_from_files

Domain
detected Domain: types.dot

XIOC detected Domain: types.dot

extracted_from_files

Domain
detected Domain: ncolor.orange

XIOC detected Domain: ncolor.orange

extracted_from_files

Domain
detected Domain: ncolor.blue

XIOC detected Domain: ncolor.blue

extracted_from_files

Domain
detected Domain: nta.bb

XIOC detected Domain: nta.bb

extracted_from_files

Domain
detected Domain: font.family

XIOC detected Domain: font.family

extracted_from_files

Domain
detected Domain: myudt.new

XIOC detected Domain: myudt.new

extracted_from_files

Domain
detected Domain: color.navy

XIOC detected Domain: color.navy

extracted_from_files

Domain
detected Domain: nmatrix.is

XIOC detected Domain: nmatrix.is

extracted_from_files

Domain
detected Domain: matrix.is

XIOC detected Domain: matrix.is

extracted_from_files

Domain
detected Domain: chart.is

XIOC detected Domain: chart.is

extracted_from_files

Domain
detected Domain: boxesbox.new

XIOC detected Domain: boxesbox.new

extracted_from_files

Domain
detected Domain: array.new

XIOC detected Domain: array.new

extracted_from_files

Domain
detected Domain: line.new

XIOC detected Domain: line.new

extracted_from_files

Domain
detected Domain: map.new

XIOC detected Domain: map.new

extracted_from_files

Domain
detected Domain: size.auto

XIOC detected Domain: size.auto

extracted_from_files

Domain
detected Domain: dividends.net

XIOC detected Domain: dividends.net

extracted_from_files

Domain
detected Domain: ncolor.red

XIOC detected Domain: ncolor.red

extracted_from_files

Domain
detected Domain: line.style

XIOC detected Domain: line.style

extracted_from_files

Domain
detected Domain: label.style

XIOC detected Domain: label.style

extracted_from_files

Domain
detected Domain: ta.mom

XIOC detected Domain: ta.mom

extracted_from_files

Domain
detected Domain: table.new

XIOC detected Domain: table.new

extracted_from_files

Domain
detected Domain: nposition.top

XIOC detected Domain: nposition.top

extracted_from_files

Domain
detected Domain: color.black

XIOC detected Domain: color.black

extracted_from_files

Domain
detected Domain: matrix.new

XIOC detected Domain: matrix.new

extracted_from_files

Domain
detected Domain: color.new

XIOC detected Domain: color.new

extracted_from_files

Domain
detected Domain: color.green

XIOC detected Domain: color.green

extracted_from_files

Domain
detected Domain: color.red

XIOC detected Domain: color.red

extracted_from_files

Domain
detected Domain: color.orange

XIOC detected Domain: color.orange

extracted_from_files

Domain
detected Domain: nlabel.new

XIOC detected Domain: nlabel.new

extracted_from_files

Domain
detected Domain: chart.bg

XIOC detected Domain: chart.bg

extracted_from_files

Domain
detected Domain: nline.new

XIOC detected Domain: nline.new

extracted_from_files

Domain
detected Domain: expectedparam.name

XIOC detected Domain: expectedparam.name

extracted_from_files

Domain
detected Domain: request.security

XIOC detected Domain: request.security

extracted_from_files

Domain
detected Domain: deprecatedcall.name

XIOC detected Domain: deprecatedcall.name

extracted_from_files

Domain
detected Domain: mozilla.org

XIOC detected Domain: mozilla.org

extracted_from_files

Domain
detected Domain: color.blue

XIOC detected Domain: color.blue

extracted_from_files

Domain
detected Domain: plot.style

XIOC detected Domain: plot.style

extracted_from_files

Domain
detected Domain: input.int

XIOC detected Domain: input.int

extracted_from_files

Domain
detected Domain: p.name

XIOC detected Domain: p.name

extracted_from_files

Domain
detected Domain: functioncall.parameters.map

XIOC detected Domain: functioncall.parameters.map

extracted_from_files

Domain
detected Domain: functioncalls.map

XIOC detected Domain: functioncalls.map

extracted_from_files

Domain
detected Domain: call.name

XIOC detected Domain: call.name

extracted_from_files

Domain
detected Domain: p.value.name

XIOC detected Domain: p.value.name

extracted_from_files

Domain
detected Domain: p.value.property

XIOC detected Domain: p.value.property

extracted_from_files

Domain
detected Domain: signature.name

XIOC detected Domain: signature.name

extracted_from_files

Domain
detected Domain: result.violations.map

XIOC detected Domain: result.violations.map

extracted_from_files

Domain
detected Domain: ta.bb

XIOC detected Domain: ta.bb

extracted_from_files

Domain
detected Domain: functioncall.name

XIOC detected Domain: functioncall.name

extracted_from_files

Domain
detected Domain: expectedtype.name

XIOC detected Domain: expectedtype.name

extracted_from_files

Domain
detected Domain: node.property

XIOC detected Domain: node.property

extracted_from_files

Domain
detected Domain: value.name

XIOC detected Domain: value.name

extracted_from_files

Domain
detected Domain: signature.parameters.map

XIOC detected Domain: signature.parameters.map

extracted_from_files

Domain
detected Domain: err.name

XIOC detected Domain: err.name

extracted_from_files

Domain
detected Domain: result.data

XIOC detected Domain: result.data

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: box.new

XIOC detected Domain: box.new

extracted_from_files

Domain
detected Domain: label.new

XIOC detected Domain: label.new

extracted_from_files

Domain
detected Domain: udttype.new

XIOC detected Domain: udttype.new

extracted_from_files

URL
detected URL: https://www.tradingview.com/pine-script-docs/en/v6/language/User-defined_types.html#na-values',

XIOC detected URL: https://www.tradingview.com/pine-script-docs/en/v6/language/User-defined_types.html#na-values',

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: ncolor.green

XIOC detected Domain: ncolor.green

extracted_from_files

Domain
detected Domain: file.summary.total

XIOC detected Domain: file.summary.total

extracted_from_files

Domain
detected Domain: functiondef.name

XIOC detected Domain: functiondef.name

extracted_from_files

Domain
detected Domain: functiondef.arguments.map

XIOC detected Domain: functiondef.arguments.map

extracted_from_files

Domain
detected Domain: arg.name

XIOC detected Domain: arg.name

extracted_from_files

Domain
detected Domain: violations.map

XIOC detected Domain: violations.map

extracted_from_files

Domain
detected Domain: result.summary.total

XIOC detected Domain: result.summary.total

extracted_from_files

Domain
detected Domain: directoryresult.summary.total

XIOC detected Domain: directoryresult.summary.total

extracted_from_files

Domain
detected Domain: summary.total

XIOC detected Domain: summary.total

extracted_from_files

Domain
detected Domain: aggregatedsummary.total

XIOC detected Domain: aggregatedsummary.total

extracted_from_files

Domain
detected Domain: resultjson.summary.total

XIOC detected Domain: resultjson.summary.total

extracted_from_files

Domain
detected Domain: directoryresult.directory

XIOC detected Domain: directoryresult.directory

extracted_from_files

Domain
detected Domain: ai-integration.md

XIOC detected Domain: ai-integration.md

extracted_from_files

Domain
detected Domain: maintainer.md

XIOC detected Domain: maintainer.md

extracted_from_files

Domain
detected Domain: set-session-type.sh

XIOC detected Domain: set-session-type.sh

extracted_from_files

Domain
detected Domain: reference.metadata.total

XIOC detected Domain: reference.metadata.total

extracted_from_files

Domain
detected Domain: data.tags.map

XIOC detected Domain: data.tags.map

extracted_from_files

Domain
detected Domain: chunks.map

XIOC detected Domain: chunks.map

extracted_from_files

Domain
detected Domain: params.directory

XIOC detected Domain: params.directory

extracted_from_files

Domain
detected Domain: changelog.md

XIOC detected Domain: changelog.md

extracted_from_files

Domain
detected Domain: example.com

XIOC detected Domain: example.com

extracted_from_files

Domain
detected Domain: www.tradingview.com

XIOC detected Domain: www.tradingview.com

extracted_from_files

Domain
detected Domain: firecrawl.dev

XIOC detected Domain: firecrawl.dev

extracted_from_files

Domain
detected Domain: user-guide.md

XIOC detected Domain: user-guide.md

extracted_from_files

Domain
detected Domain: a1b2c3d4.md

XIOC detected Domain: a1b2c3d4.md

extracted_from_files

Domain
detected Domain: f7e8d9c2.md

XIOC detected Domain: f7e8d9c2.md

extracted_from_files

Domain
detected Domain: queries.map

XIOC detected Domain: queries.map

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: readme.md

XIOC detected Domain: readme.md

extracted_from_files

Domain
detected Domain: agent.md

XIOC detected Domain: agent.md

extracted_from_files

Domain
detected Domain: keepachangelog.com

XIOC detected Domain: keepachangelog.com

extracted_from_files

Domain
detected Domain: semver.org

XIOC detected Domain: semver.org

extracted_from_files

Domain
detected Domain: anthropic.com

XIOC detected Domain: anthropic.com

extracted_from_files

URL
detected URL: https://mozilla.org/MPL/2.0///

XIOC detected URL: https://mozilla.org/MPL/2.0///

extracted_from_files

URL
detected URL: https://www.tradingview.com/pine-script-docs/language/operators/

XIOC detected URL: https://www.tradingview.com/pine-script-docs/language/operators/

extracted_from_files

URL
detected URL: https://www.tradingview.com/pine-script-docs/en/v6/language/User-defined_types.html',

XIOC detected URL: https://www.tradingview.com/pine-script-docs/en/v6/language/User-defined_types.html',

extracted_from_files

Domain
detected Domain: strategy.commission.cash

XIOC detected Domain: strategy.commission.cash

extracted_from_files

URL
detected URL: https://www.tradingview.com/pine-script-docs/en/v6/language/User-defined_types.html#history-referencing',

XIOC detected URL: https://www.tradingview.com/pine-script-docs/en/v6/language/User-defined_types.html#history-referencing',

extracted_from_files

Domain
detected Domain: ncolor.new

XIOC detected Domain: ncolor.new

extracted_from_files

Domain
detected Domain: linecontinuationresult.violations.map

XIOC detected Domain: linecontinuationresult.violations.map

extracted_from_files

Domain
detected Domain: timeframe.in

XIOC detected Domain: timeframe.in

extracted_from_files

Security Analysis Summary

Security Analysis Overview

@iflow-mcp/iamrichardd-mcp-server-pinescript is a mcp extension published by chatflowdev. Version 3.3.23 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 478 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • Critical: 91 finding(s)
  • High: 126 finding(s)
  • Medium: 220 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

@iflow-mcp/iamrichardd-mcp-server-pinescript is published by chatflowdev on the mcp marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions