Is "@web-marketing-hr/azure-devops-mcp" on MCP Registry Safe to Install?

mlukanic · mcp · v2.3.42

MCP server for interacting with Azure DevOps (on-premises) WEM fork

Risk Assessment

Analyzed
100
out of 100
CRITICAL

256 security findings detected across all analyzers

MCP server analyzed for tool poisoning, prompt injection, and data exfiltration

Severity Breakdown

0
Critical
72
High
175
Medium
6
Low
0
Info

Finding Categories

67
Malware Signatures
5
Secrets
17
Network
154
IoC Indicators

YARA Rules Matched

13 rules(67 hits)
credential env files postinstall network communication postinstall file download postinstall file manipulation postinstall system command postinstall obfuscation postinstall crypto operations UsingCommandLineArguments package json suspicious scripts postinstall environment access UsingShellInterpreterWhenExecutingOSCommands postinstall persistence mechanism postinstall registry modification

MCP Server Analysis

MCP servers expose tools and resources to AI assistants. Unlike browser extensions, they run as standalone processes with direct system access. Tool definitions are analyzed for prompt injection, data exfiltration, and tool poisoning patterns.

About This Extension

MCP server for interacting with Azure DevOps (on-premises) WEM fork

Detailed Findings

98 total

YARA Rule Matches

13 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
33
IP Addresses
4
Domains
120
Strings
154

All Indicators · 154

Domain
detected Domain: files.map

XIOC detected Domain: files.map

extracted_from_files

Domain
detected Domain: nodejs.org

XIOC detected Domain: nodejs.org

extracted_from_files

Domain
detected Domain: tools.search

XIOC detected Domain: tools.search

extracted_from_files

Domain
detected Domain: searchcriteria.author

XIOC detected Domain: searchcriteria.author

extracted_from_files

URL
detected URL: https://nodejs.org/en/download)

XIOC detected URL: https://nodejs.org/en/download)

extracted_from_files

URL
detected URL: https://img.shields.io/badge/VS_Code-Install_AzureDevops_MCP_Server-0098FF?style=flat-square&logo=visualstudiocode&logoColor=white)](https://insiders.vscode.dev/redirect/mcp/install?name=ado&config=%7B%20%22type%22%3A%20%22stdio%22%2C%20%22command%22%3A%20%22npx%22%2C%20%22args%22%3A%20%5B%22-y%22%2C%20%22%40azure-devops%2Fmcp%22%2C%20%22%24%7Binput%3Aado_org%7D%22%5D%7D&inputs=%5B%7B%22id%22%3A%20%22ado_org%22%2C%20%22type%22%3A%20%22promptString%22%2C%20%22description%22%3A%20%22Azure%20DevOps%20organization%20name%20%20%28e.g.%20%27contoso%27%29%22%7D%5D)

XIOC detected URL: https://img.shields.io/badge/VS_Code-Install_AzureDevops_MCP_Server-0098FF?style=flat-square&logo=visualstudiocode&logoColor=white)](https://insiders.vscode.dev/redirect/mcp/install?name=ado&config=%7B%20%22type%22%3A%20%22stdio%22%2C%20%22command%22%3A%20%22npx%22%2C%20%22args%22%3A%20%5B%22-y%22%2C%20%22%40azure-devops%2Fmcp%22%2C%20%22%24%7Binput%3Aado_org%7D%22%5D%7D&inputs=%5B%7B%22id%22%3A%20%22ado_org%22%2C%20%22type%22%3A%20%22promptString%22%2C%20%22description%22%3A%20%22Azure%20DevOps%20organization%20name%20%20%28e.g.%20%27contoso%27%29%22%7D%5D)

extracted_from_files

URL
detected URL: https://img.shields.io/badge/VS_Code_Insiders-Install_AzureDevops_MCP_Server-24bfa5?style=flat-square&logo=visualstudiocode&logoColor=white)](https://insiders.vscode.dev/redirect/mcp/install?name=ado&quality=insiders&config=%7B%20%22type%22%3A%20%22stdio%22%2C%20%22command%22%3A%20%22npx%22%2C%20%22args%22%3A%20%5B%22-y%22%2C%20%22%40azure-devops%2Fmcp%22%2C%20%22%24%7Binput%3Aado_org%7D%22%5D%7D&inputs=%5B%7B%22id%22%3A%20%22ado_org%22%2C%20%22type%22%3A%20%22promptString%22%2C%20%22description%22%3A%20%22Azure%20DevOps%20organization%20name%20%20%28e.g.%20%27contoso%27%29%22%7D%5D)

XIOC detected URL: https://img.shields.io/badge/VS_Code_Insiders-Install_AzureDevops_MCP_Server-24bfa5?style=flat-square&logo=visualstudiocode&logoColor=white)](https://insiders.vscode.dev/redirect/mcp/install?name=ado&quality=insiders&config=%7B%20%22type%22%3A%20%22stdio%22%2C%20%22command%22%3A%20%22npx%22%2C%20%22args%22%3A%20%5B%22-y%22%2C%20%22%40azure-devops%2Fmcp%22%2C%20%22%24%7Binput%3Aado_org%7D%22%5D%7D&inputs=%5B%7B%22id%22%3A%20%22ado_org%22%2C%20%22type%22%3A%20%22promptString%22%2C%20%22description%22%3A%20%22Azure%20DevOps%20organization%20name%20%20%28e.g.%20%27contoso%27%29%22%7D%5D)

extracted_from_files

Domain
detected Domain: domain.search

XIOC detected Domain: domain.search

extracted_from_files

Domain
detected Domain: tools.js.map

XIOC detected Domain: tools.js.map

extracted_from_files

Domain
detected Domain: info.name

XIOC detected Domain: info.name

extracted_from_files

Domain
detected Domain: useragent.js.map

XIOC detected Domain: useragent.js.map

extracted_from_files

Domain
detected Domain: values.map

XIOC detected Domain: values.map

extracted_from_files

Domain
detected Domain: utils.js.map

XIOC detected Domain: utils.js.map

extracted_from_files

Domain
detected Domain: version.js.map

XIOC detected Domain: version.js.map

extracted_from_files

Domain
detected Domain: node.id

XIOC detected Domain: node.id

extracted_from_files

Domain
detected Domain: member.teammember.id

XIOC detected Domain: member.teammember.id

extracted_from_files

Domain
detected Domain: activities.map

XIOC detected Domain: activities.map

extracted_from_files

Domain
detected Domain: updatedcapacity.teammember.id

XIOC detected Domain: updatedcapacity.teammember.id

extracted_from_files

Domain
detected Domain: work.js.map

XIOC detected Domain: work.js.map

extracted_from_files

Domain
detected Domain: domain.work

XIOC detected Domain: domain.work

extracted_from_files

Domain
detected Domain: domain.wiki

XIOC detected Domain: domain.wiki

extracted_from_files

Domain
detected Domain: update.id

XIOC detected Domain: update.id

extracted_from_files

Domain
detected Domain: uniqueids.map

XIOC detected Domain: uniqueids.map

extracted_from_files

Domain
detected Domain: workitemupdates.map

XIOC detected Domain: workitemupdates.map

extracted_from_files

Domain
detected Domain: tools.work

XIOC detected Domain: tools.work

extracted_from_files

Domain
detected Domain: relations.map

XIOC detected Domain: relations.map

extracted_from_files

Domain
detected Domain: relationindexes.map

XIOC detected Domain: relationindexes.map

extracted_from_files

Domain
detected Domain: work-items.js.map

XIOC detected Domain: work-items.js.map

extracted_from_files

Domain
detected Domain: system.id

XIOC detected Domain: system.id

extracted_from_files

Domain
detected Domain: fieldvalue.id

XIOC detected Domain: fieldvalue.id

extracted_from_files

Domain
detected Domain: items.map

XIOC detected Domain: items.map

extracted_from_files

Domain
detected Domain: tools.link

XIOC detected Domain: tools.link

extracted_from_files

Domain
detected Domain: updates.map

XIOC detected Domain: updates.map

extracted_from_files

Domain
detected Domain: fields.map

XIOC detected Domain: fields.map

extracted_from_files

Domain
detected Domain: workitem.id

XIOC detected Domain: workitem.id

extracted_from_files

Domain
detected Domain: suite.name

XIOC detected Domain: suite.name

extracted_from_files

Domain
detected Domain: suite.children.map

XIOC detected Domain: suite.children.map

extracted_from_files

Domain
detected Domain: roots.map

XIOC detected Domain: roots.map

extracted_from_files

Domain
detected Domain: test-plans.js.map

XIOC detected Domain: test-plans.js.map

extracted_from_files

Domain
detected Domain: dev.azure.com

XIOC detected Domain: dev.azure.com

extracted_from_files

Domain
detected Domain: wiki.js.map

XIOC detected Domain: wiki.js.map

extracted_from_files

IP
detected Domain: pipelines.js.map

XIOC detected Domain: pipelines.js.map

extracted_from_files

URL
detected URL: https://code.visualstudio.com/download)

XIOC detected URL: https://code.visualstudio.com/download)

extracted_from_files

URL
detected URL: https://code.visualstudio.com/insiders)

XIOC detected URL: https://code.visualstudio.com/insiders)

extracted_from_files

Domain
detected Domain: commit.author

XIOC detected Domain: commit.author

extracted_from_files

Domain
detected Domain: repositories.js.map

XIOC detected Domain: repositories.js.map

extracted_from_files

Domain
detected Domain: filters.wiki

XIOC detected Domain: filters.wiki

extracted_from_files

Domain
detected Domain: search.js.map

XIOC detected Domain: search.js.map

extracted_from_files

Domain
detected Domain: suite.id

XIOC detected Domain: suite.id

extracted_from_files

Domain
detected Domain: item.id

XIOC detected Domain: item.id

extracted_from_files

Domain
detected Domain: item.vote

XIOC detected Domain: item.vote

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: repo.id

XIOC detected Domain: repo.id

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: b.id

XIOC detected Domain: b.id

extracted_from_files

Domain
detected Domain: label.name

XIOC detected Domain: label.name

extracted_from_files

Domain
detected Domain: comment.author

XIOC detected Domain: comment.author

extracted_from_files

Domain
detected Domain: repo.name

XIOC detected Domain: repo.name

extracted_from_files

Domain
detected Domain: labels.map

XIOC detected Domain: labels.map

extracted_from_files

Domain
detected Domain: b.name

XIOC detected Domain: b.name

extracted_from_files

Domain
detected Domain: data.authenticateduser.id

XIOC detected Domain: data.authenticateduser.id

extracted_from_files

Domain
detected Domain: reviewerids.map

XIOC detected Domain: reviewerids.map

extracted_from_files

Domain
detected Domain: updatedpullrequest.map

XIOC detected Domain: updatedpullrequest.map

extracted_from_files

Domain
detected Domain: repositorypayload.name

XIOC detected Domain: repositorypayload.name

extracted_from_files

URL
detected URL: https://registry.npmjs.org/

XIOC detected URL: https://registry.npmjs.org/

extracted_from_files

Domain
detected Domain: img.shields.io

XIOC detected Domain: img.shields.io

extracted_from_files

URL
detected URL: http://127.0.0.1:6274

XIOC detected URL: http://127.0.0.1:6274

extracted_from_files

Domain
detected Domain: branch.name

XIOC detected Domain: branch.name

extracted_from_files

Domain
detected Domain: thread.id

XIOC detected Domain: thread.id

extracted_from_files

Domain
detected Domain: comment.id

XIOC detected Domain: comment.id

extracted_from_files

Domain
detected Domain: architecture.js.map

XIOC detected Domain: architecture.js.map

extracted_from_files

Domain
detected Domain: firstidentity.id

XIOC detected Domain: firstidentity.id

extracted_from_files

Domain
detected Domain: project.name

XIOC detected Domain: project.name

extracted_from_files

Domain
detected Domain: identity.id

XIOC detected Domain: identity.id

extracted_from_files

Domain
detected Domain: core.js.map

XIOC detected Domain: core.js.map

extracted_from_files

Domain
detected Domain: z.coerce.date

XIOC detected Domain: z.coerce.date

extracted_from_files

Domain
detected Domain: repositorypayload.id

XIOC detected Domain: repositorypayload.id

extracted_from_files

Domain
detected Domain: advanced-security.js.map

XIOC detected Domain: advanced-security.js.map

extracted_from_files

Domain
detected Domain: entry.name

XIOC detected Domain: entry.name

extracted_from_files

Domain
detected Domain: p.name

XIOC detected Domain: p.name

extracted_from_files

Domain
detected Domain: queuedbuild.id

XIOC detected Domain: queuedbuild.id

extracted_from_files

Domain
detected Domain: tools.my

XIOC detected Domain: tools.my

extracted_from_files

URL
detected URL: https://devops.moja-firma.hr/MyCollection

XIOC detected URL: https://devops.moja-firma.hr/MyCollection

extracted_from_files

Domain
detected Domain: ashxfiles.map

XIOC detected Domain: ashxfiles.map

extracted_from_files

Domain
detected Domain: domains.js.map

XIOC detected Domain: domains.js.map

extracted_from_files

Domain
detected Domain: tool-validation.js.map

XIOC detected Domain: tool-validation.js.map

extracted_from_files

Domain
detected Domain: httpntlm.post

XIOC detected Domain: httpntlm.post

extracted_from_files

Domain
detected Domain: res.data

XIOC detected Domain: res.data

extracted_from_files

Domain
detected Domain: checkres.data

XIOC detected Domain: checkres.data

extracted_from_files

Domain
detected Domain: checkdata.data

XIOC detected Domain: checkdata.data

extracted_from_files

Domain
detected Domain: 7pace.js.map

XIOC detected Domain: 7pace.js.map

extracted_from_files

Domain
detected Domain: winston.transports.stream

XIOC detected Domain: winston.transports.stream

extracted_from_files

Domain
detected Domain: logger.js.map

XIOC detected Domain: logger.js.map

extracted_from_files

Domain
detected Domain: vssps.dev.azure.com

XIOC detected Domain: vssps.dev.azure.com

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: org-tenants.js.map

XIOC detected Domain: org-tenants.js.map

extracted_from_files

Domain
detected Domain: prompts.js.map

XIOC detected Domain: prompts.js.map

extracted_from_files

Domain
detected Domain: domainsinput.map

XIOC detected Domain: domainsinput.map

extracted_from_files

Domain
detected Domain: process.env.azure

XIOC detected Domain: process.env.azure

extracted_from_files

Domain
detected Domain: auth.js.map

XIOC detected Domain: auth.js.map

extracted_from_files

Domain
detected Domain: cdn.vsassets.io

XIOC detected Domain: cdn.vsassets.io

extracted_from_files

Domain
detected Domain: almsearch.dev.azure.com

XIOC detected Domain: almsearch.dev.azure.com

extracted_from_files

Domain
detected Domain: argv.domains

XIOC detected Domain: argv.domains

extracted_from_files

Domain
detected Domain: logger.info

XIOC detected Domain: logger.info

extracted_from_files

Domain
detected Domain: index.js.map

XIOC detected Domain: index.js.map

extracted_from_files

Domain
detected Domain: howto.md

XIOC detected Domain: howto.md

extracted_from_files

Domain
detected Domain: faq.md

XIOC detected Domain: faq.md

extracted_from_files

Domain
detected Domain: contributing.md

XIOC detected Domain: contributing.md

extracted_from_files

Domain
detected Domain: microsoft.com

XIOC detected Domain: microsoft.com

extracted_from_files

Domain
detected Domain: star-history.com

XIOC detected Domain: star-history.com

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: license.md

XIOC detected Domain: license.md

extracted_from_files

Domain
detected Domain: www.microsoft.com

XIOC detected Domain: www.microsoft.com

extracted_from_files

Domain
detected Domain: insiders.vscode.dev

XIOC detected Domain: insiders.vscode.dev

extracted_from_files

Domain
detected Domain: toolset.md

XIOC detected Domain: toolset.md

extracted_from_files

Domain
detected Domain: gettingstarted.md

XIOC detected Domain: gettingstarted.md

extracted_from_files

Domain
detected Domain: copilot-instructions.md

XIOC detected Domain: copilot-instructions.md

extracted_from_files

Domain
detected Domain: troubleshooting.md

XIOC detected Domain: troubleshooting.md

extracted_from_files

Domain
detected Domain: examples.md

XIOC detected Domain: examples.md

extracted_from_files

Hash
detected SHA1 Hash: 0000000000000000000000000000000000000000

XIOC detected SHA1 Hash: 0000000000000000000000000000000000000000

extracted_from_files

Domain
detected Domain: csfiles.map

XIOC detected Domain: csfiles.map

extracted_from_files

Domain
detected Domain: youtu.be

XIOC detected Domain: youtu.be

extracted_from_files

Domain
detected Domain: opensource.microsoft.com

XIOC detected Domain: opensource.microsoft.com

extracted_from_files

Domain
detected Domain: api.star-history.com

XIOC detected Domain: api.star-history.com

extracted_from_files

Domain
detected Domain: contrib.rocks

XIOC detected Domain: contrib.rocks

extracted_from_files

URL
detected URL: https://img.shields.io/badge/VS_Code-Install_AzureDevops_MCP_Server-0098FF?style=flat-square&logo=visualstudiocode&logoColor=white)](https://insiders.vscode.dev/redirect/mcp/install?name=ado_op&config=%7B%20%22type%22%3A%20%22stdio%22%2C%20%22command%22%3A%20%22npx%22%2C%20%22args%22%3A%20%5B%22-y%22%2C%20%22%40web-marketing-hr%2Fazure-devops-mcp%22%2C%20%22_DEVOPS_PROJECT_NAME_HERE_%22%2C%20%22--authentication%22%2C%20%22envvar%22%5D%7D)

XIOC detected URL: https://img.shields.io/badge/VS_Code-Install_AzureDevops_MCP_Server-0098FF?style=flat-square&logo=visualstudiocode&logoColor=white)](https://insiders.vscode.dev/redirect/mcp/install?name=ado_op&config=%7B%20%22type%22%3A%20%22stdio%22%2C%20%22command%22%3A%20%22npx%22%2C%20%22args%22%3A%20%5B%22-y%22%2C%20%22%40web-marketing-hr%2Fazure-devops-mcp%22%2C%20%22_DEVOPS_PROJECT_NAME_HERE_%22%2C%20%22--authentication%22%2C%20%22envvar%22%5D%7D)

extracted_from_files

URL
detected URL: https://contrib.rocks/image?repo=microsoft/azure-devops-mcp)](https://github.com/microsoft/azure-devops-mcp/graphs/contributors)

XIOC detected URL: https://contrib.rocks/image?repo=microsoft/azure-devops-mcp)](https://github.com/microsoft/azure-devops-mcp/graphs/contributors)

extracted_from_files

URL
detected URL: https://api.star-history.com/svg?repos=microsoft/azure-devops-mcp&type=Date)](https://star-history.com/#microsoft/azure-devops-mcp)

XIOC detected URL: https://api.star-history.com/svg?repos=microsoft/azure-devops-mcp&type=Date)](https://star-history.com/#microsoft/azure-devops-mcp)

extracted_from_files

IP
detected Domain: pipelinerun.id

XIOC detected Domain: pipelinerun.id

extracted_from_files

URL
detected URL: https://opensource.microsoft.com/codeofconduct/faq/)

XIOC detected URL: https://opensource.microsoft.com/codeofconduct/faq/)

extracted_from_files

URL
detected URL: https://opensource.microsoft.com/codeofconduct/).

XIOC detected URL: https://opensource.microsoft.com/codeofconduct/).

extracted_from_files

URL
detected URL: https://code.visualstudio.com/blogs/2025/02/24/introducing-copilot-agent-mode).

XIOC detected URL: https://code.visualstudio.com/blogs/2025/02/24/introducing-copilot-agent-mode).

extracted_from_files

URL
detected URL: https://youtu.be/EUmFM6qXoYk)

XIOC detected URL: https://youtu.be/EUmFM6qXoYk)

extracted_from_files

URL
detected URL: https://code.visualstudio.com/docs/copilot/chat/chat-agent-mode).

XIOC detected URL: https://code.visualstudio.com/docs/copilot/chat/chat-agent-mode).

extracted_from_files

URL
detected URL: https://vssps.dev.azure.com

XIOC detected URL: https://vssps.dev.azure.com

extracted_from_files

URL
detected URL: https://almsearch.dev.azure.com/$

XIOC detected URL: https://almsearch.dev.azure.com/$

extracted_from_files

URL
detected URL: https://cdn.vsassets.io/content/icons/favicon.ico

XIOC detected URL: https://cdn.vsassets.io/content/icons/favicon.ico

extracted_from_files

URL
detected URL: https://login.microsoftonline.com/$

XIOC detected URL: https://login.microsoftonline.com/$

extracted_from_files

URL
detected URL: https://login.microsoftonline.com/common

XIOC detected URL: https://login.microsoftonline.com/common

extracted_from_files

URL
detected URL: https://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/usage/general).

XIOC detected URL: https://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/usage/general).

extracted_from_files

URL
detected URL: https://contrib.rocks)

XIOC detected URL: https://contrib.rocks)

extracted_from_files

URL
detected URL: https://dev.azure.com/

XIOC detected URL: https://dev.azure.com/

extracted_from_files

URL
detected URL: https://vssps.dev.azure.com/$

XIOC detected URL: https://vssps.dev.azure.com/$

extracted_from_files

URL
detected URL: http://tfsmoon.wem.local:8090/api/New/rest/activityTypes?api-version=3.1

XIOC detected URL: http://tfsmoon.wem.local:8090/api/New/rest/activityTypes?api-version=3.1

extracted_from_files

URL
detected URL: http://tfsmoon.wem.local:8090/api/New/rest

XIOC detected URL: http://tfsmoon.wem.local:8090/api/New/rest

extracted_from_files

URL
detected URL: https://github.com/WEB-Marketing-d-o-o/azure-devops-mcp.git

XIOC detected URL: https://github.com/WEB-Marketing-d-o-o/azure-devops-mcp.git

extracted_from_files

URL
detected URL: https://github.com/WEB-Marketing-d-o-o/azure-devops-mcp/issues

XIOC detected URL: https://github.com/WEB-Marketing-d-o-o/azure-devops-mcp/issues

extracted_from_files

URL
detected URL: https://github.com/WEB-Marketing-d-o-o/azure-devops-mcp

XIOC detected URL: https://github.com/WEB-Marketing-d-o-o/azure-devops-mcp

extracted_from_files

URL
detected URL: https://dev.azure.com/$

XIOC detected URL: https://dev.azure.com/$

extracted_from_files

URL
detected URL: https://dev.azure.com/org/project/_wiki/wikis/wikiIdentifier/123/Title-Of-Page

XIOC detected URL: https://dev.azure.com/org/project/_wiki/wikis/wikiIdentifier/123/Title-Of-Page

extracted_from_files

URL
detected URL: https://dev.azure.com/org/project/_wiki/wikis/wikiIdentifier?wikiVersion=GBmain&pagePath=%2FHome

XIOC detected URL: https://dev.azure.com/org/project/_wiki/wikis/wikiIdentifier?wikiVersion=GBmain&pagePath=%2FHome

extracted_from_files

Domain
detected Domain: devops.moja-firma.hr

XIOC detected Domain: devops.moja-firma.hr

extracted_from_files

Domain
detected Domain: code.visualstudio.com

XIOC detected Domain: code.visualstudio.com

extracted_from_files

Domain
detected Domain: csprojfiles.map

XIOC detected Domain: csprojfiles.map

extracted_from_files

Security Analysis Summary

Security Analysis Overview

@web-marketing-hr/azure-devops-mcp is a mcp extension published by mlukanic. Version 2.3.42 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 256 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 72 finding(s)
  • Medium: 175 finding(s)
  • Low: 6 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

@web-marketing-hr/azure-devops-mcp is published by mlukanic on the mcp marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions