Is "@netpad/mcp-server" on MCP Registry Safe to Install?

merlynn · mcp · v3.0.1

MCP server for AI-assisted NetPad application development - 75 tools for forms, workflows, applications, marketplace, npm, conversational forms, search interfaces, 25+ templates, and MongoDB data browser

Risk Assessment

Analyzed
100
out of 100
CRITICAL

465 security findings detected across all analyzers

MCP server analyzed for tool poisoning, prompt injection, and data exfiltration

Severity Breakdown

4
Critical
118
High
340
Medium
0
Low
0
Info

Finding Categories

40
Malware Signatures
78
Secrets
112
Network
209
IoC Indicators

YARA Rules Matched

13 rules(40 hits)
postinstall persistence mechanism postinstall system command postinstall registry modification postinstall file download postinstall network communication postinstall file manipulation SQLInjection UsingCommandLineArguments postinstall obfuscation postinstall crypto operations NoUseWeakRandom credential env files postinstall environment access

MCP Server Analysis

MCP servers expose tools and resources to AI assistants. Unlike browser extensions, they run as standalone processes with direct system access. Tool definitions are analyzed for prompt injection, data exfiltration, and tool poisoning patterns.

About This Extension

MCP server for AI-assisted NetPad application development - 75 tools for forms, workflows, applications, marketplace, npm, conversational forms, search interfaces, 25+ templates, and MongoDB data browser

Detailed Findings

240 total

YARA Rule Matches

13 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
38
IP Addresses
10
Domains
158
Strings
209

All Indicators · 209

Domain
detected Domain: s.id

XIOC detected Domain: s.id

extracted_from_files

Domain
detected Domain: example.com

XIOC detected Domain: example.com

extracted_from_files

Domain
detected Domain: company.com

XIOC detected Domain: company.com

extracted_from_files

Domain
detected Domain: www.npmjs.com

XIOC detected Domain: www.npmjs.com

extracted_from_files

Domain
detected Domain: netpad.io

XIOC detected Domain: netpad.io

extracted_from_files

Domain
detected Domain: email-send.to

XIOC detected Domain: email-send.to

extracted_from_files

Domain
detected Domain: semver.org

XIOC detected Domain: semver.org

extracted_from_files

Domain
detected Domain: keepachangelog.com

XIOC detected Domain: keepachangelog.com

extracted_from_files

Domain
detected Domain: docs.netpad.io

XIOC detected Domain: docs.netpad.io

extracted_from_files

Domain
detected Domain: emergencycontact.phone

XIOC detected Domain: emergencycontact.phone

extracted_from_files

Domain
detected Domain: emergencycontact.name

XIOC detected Domain: emergencycontact.name

extracted_from_files

IP
detected Domain: address.zip

XIOC detected Domain: address.zip

extracted_from_files

Domain
detected Domain: address.city

XIOC detected Domain: address.city

extracted_from_files

IP
detected Domain: billing.zip

XIOC detected Domain: billing.zip

extracted_from_files

Domain
detected Domain: billing.city

XIOC detected Domain: billing.city

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: yourcompany.com

XIOC detected Domain: yourcompany.com

extracted_from_files

Domain
detected Domain: docs.google.com

XIOC detected Domain: docs.google.com

extracted_from_files

Domain
detected Domain: mui.com

XIOC detected Domain: mui.com

extracted_from_files

Domain
detected Domain: api.example.com

XIOC detected Domain: api.example.com

extracted_from_files

Domain
detected Domain: registry.npmjs.org

XIOC detected Domain: registry.npmjs.org

extracted_from_files

Domain
detected Domain: your-netpad-instance.com

XIOC detected Domain: your-netpad-instance.com

extracted_from_files

Domain
detected Domain: this.data

XIOC detected Domain: this.data

extracted_from_files

Domain
detected Domain: ctx.data

XIOC detected Domain: ctx.data

extracted_from_files

Domain
detected Domain: issue.unionerrors.map

XIOC detected Domain: issue.unionerrors.map

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: zodparsedtype.date

XIOC detected Domain: zodparsedtype.date

extracted_from_files

Domain
detected Domain: zodparsedtype.map

XIOC detected Domain: zodparsedtype.map

extracted_from_files

Domain
detected Domain: array.map

XIOC detected Domain: array.map

extracted_from_files

Domain
detected Domain: sharedvalue.data

XIOC detected Domain: sharedvalue.data

extracted_from_files

Domain
detected Domain: issues.map

XIOC detected Domain: issues.map

extracted_from_files

Domain
detected Domain: options.map

XIOC detected Domain: options.map

extracted_from_files

Domain
detected Domain: results.map

XIOC detected Domain: results.map

extracted_from_files

Domain
detected Domain: schema.items.map

XIOC detected Domain: schema.items.map

extracted_from_files

Domain
detected Domain: result.data

XIOC detected Domain: result.data

extracted_from_files

Domain
detected Domain: input.data

XIOC detected Domain: input.data

extracted_from_files

Domain
detected Domain: cls.name

XIOC detected Domain: cls.name

extracted_from_files

Domain
detected Domain: def.in

XIOC detected Domain: def.in

extracted_from_files

Domain
detected Domain: newctx.data

XIOC detected Domain: newctx.data

extracted_from_files

Domain
detected Domain: parsedreturns.data

XIOC detected Domain: parsedreturns.data

extracted_from_files

Domain
detected Domain: parsedargs.data

XIOC detected Domain: parsedargs.data

extracted_from_files

Domain
detected Domain: def.rest

XIOC detected Domain: def.rest

extracted_from_files

Domain
detected Domain: merged.data

XIOC detected Domain: merged.data

extracted_from_files

Domain
detected Domain: types.map

XIOC detected Domain: types.map

extracted_from_files

Domain
detected Domain: form.name

XIOC detected Domain: form.name

extracted_from_files

Domain
detected Domain: p.id

XIOC detected Domain: p.id

extracted_from_files

Domain
detected Domain: pages.map

XIOC detected Domain: pages.map

extracted_from_files

Domain
detected Domain: conditions.map

XIOC detected Domain: conditions.map

extracted_from_files

Domain
detected Domain: operators.map

XIOC detected Domain: operators.map

extracted_from_files

Domain
detected Domain: pagefields.map

XIOC detected Domain: pagefields.map

extracted_from_files

Domain
detected Domain: payload.data

XIOC detected Domain: payload.data

extracted_from_files

Domain
detected Domain: formconfig.name

XIOC detected Domain: formconfig.name

extracted_from_files

Domain
detected Domain: process.env.next

XIOC detected Domain: process.env.next

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: page.id

XIOC detected Domain: page.id

extracted_from_files

Domain
detected Domain: readme.md

XIOC detected Domain: readme.md

extracted_from_files

Domain
detected Domain: app.name

XIOC detected Domain: app.name

extracted_from_files

Domain
detected Domain: options.page

XIOC detected Domain: options.page

extracted_from_files

IP
detected Domain: shipping.zip

XIOC detected Domain: shipping.zip

extracted_from_files

IP
detected Domain: shipping.city

XIOC detected Domain: shipping.city

extracted_from_files

Domain
detected Domain: body.email

XIOC detected Domain: body.email

extracted_from_files

Domain
detected Domain: formfields.map

XIOC detected Domain: formfields.map

extracted_from_files

Domain
detected Domain: input.company

XIOC detected Domain: input.company

extracted_from_files

Domain
detected Domain: data.name

XIOC detected Domain: data.name

extracted_from_files

Domain
detected Domain: data.email

XIOC detected Domain: data.email

extracted_from_files

Domain
detected Domain: metadata.name

XIOC detected Domain: metadata.name

extracted_from_files

Domain
detected Domain: options.author

XIOC detected Domain: options.author

extracted_from_files

Domain
detected Domain: packagejson.name

XIOC detected Domain: packagejson.name

extracted_from_files

Domain
detected Domain: changelog.md

XIOC detected Domain: changelog.md

extracted_from_files

Domain
detected Domain: template.id

XIOC detected Domain: template.id

extracted_from_files

Domain
detected Domain: options.name

XIOC detected Domain: options.name

extracted_from_files

Domain
detected Domain: fields.map

XIOC detected Domain: fields.map

extracted_from_files

Domain
detected Domain: edge.target

XIOC detected Domain: edge.target

extracted_from_files

Domain
detected Domain: node.id

XIOC detected Domain: node.id

extracted_from_files

Domain
detected Domain: 1.response.name

XIOC detected Domain: 1.response.name

extracted_from_files

Domain
detected Domain: input.email

XIOC detected Domain: input.email

extracted_from_files

Domain
detected Domain: finaltemplate.fields.map

XIOC detected Domain: finaltemplate.fields.map

extracted_from_files

Domain
detected Domain: finaltemplate.id

XIOC detected Domain: finaltemplate.id

extracted_from_files

Domain
detected Domain: finaltemplate.name

XIOC detected Domain: finaltemplate.name

extracted_from_files

Domain
detected Domain: customized.name

XIOC detected Domain: customized.name

extracted_from_files

Domain
detected Domain: customizations.name

XIOC detected Domain: customizations.name

extracted_from_files

Domain
detected Domain: operators.date

XIOC detected Domain: operators.date

extracted_from_files

Domain
detected Domain: template.name

XIOC detected Domain: template.name

extracted_from_files

Domain
detected Domain: metadata.id

XIOC detected Domain: metadata.id

extracted_from_files

Domain
detected Domain: coll.name

XIOC detected Domain: coll.name

extracted_from_files

Domain
detected Domain: db.name

XIOC detected Domain: db.name

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: connectiontype.setupinstructions.map

XIOC detected Domain: connectiontype.setupinstructions.map

extracted_from_files

Domain
detected Domain: config.name

XIOC detected Domain: config.name

extracted_from_files

Domain
detected Domain: connectiontype.name

XIOC detected Domain: connectiontype.name

extracted_from_files

IP
detected Domain: ts.scripttarget.es

XIOC detected Domain: ts.scripttarget.es

extracted_from_files

Domain
detected Domain: result.errors.map

XIOC detected Domain: result.errors.map

extracted_from_files

Domain
detected Domain: output.id

XIOC detected Domain: output.id

extracted_from_files

Domain
detected Domain: field.name

XIOC detected Domain: field.name

extracted_from_files

Domain
detected Domain: configfields.map

XIOC detected Domain: configfields.map

extracted_from_files

Domain
detected Domain: formdata.name

XIOC detected Domain: formdata.name

extracted_from_files

Domain
detected Domain: metadata.author

XIOC detected Domain: metadata.author

extracted_from_files

Domain
detected Domain: params.page

XIOC detected Domain: params.page

extracted_from_files

Domain
detected Domain: params.search

XIOC detected Domain: params.search

extracted_from_files

Domain
detected Domain: options.search

XIOC detected Domain: options.search

extracted_from_files

Domain
detected Domain: responsedata.data

XIOC detected Domain: responsedata.data

extracted_from_files

Domain
detected Domain: env.name

XIOC detected Domain: env.name

extracted_from_files

Domain
detected Domain: api.netpad.io

XIOC detected Domain: api.netpad.io

extracted_from_files

Domain
detected Domain: syntaxerrors.map

XIOC detected Domain: syntaxerrors.map

extracted_from_files

Domain
detected Domain: submissions.map

XIOC detected Domain: submissions.map

extracted_from_files

Domain
detected Domain: s.data

XIOC detected Domain: s.data

extracted_from_files

Domain
detected Domain: submission.id

XIOC detected Domain: submission.id

extracted_from_files

Domain
detected Domain: updates.name

XIOC detected Domain: updates.name

extracted_from_files

Domain
detected Domain: form.id

XIOC detected Domain: form.id

extracted_from_files

Domain
detected Domain: params.name

XIOC detected Domain: params.name

extracted_from_files

Domain
detected Domain: result.pagination.total

XIOC detected Domain: result.pagination.total

extracted_from_files

Domain
detected Domain: schema.name

XIOC detected Domain: schema.name

extracted_from_files

Domain
detected Domain: user.email

XIOC detected Domain: user.email

extracted_from_files

Domain
detected Domain: members.members.map

XIOC detected Domain: members.members.map

extracted_from_files

Domain
detected Domain: row.map

XIOC detected Domain: row.map

extracted_from_files

Domain
detected Domain: rows.map

XIOC detected Domain: rows.map

extracted_from_files

URL
detected URL: https://api.netpad.io

XIOC detected URL: https://api.netpad.io

extracted_from_files

Domain
detected Domain: headers.map

XIOC detected Domain: headers.map

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: template.nodes.map

XIOC detected Domain: template.nodes.map

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: templates.map

XIOC detected Domain: templates.map

extracted_from_files

Domain
detected Domain: functions.map

XIOC detected Domain: functions.map

extracted_from_files

Domain
detected Domain: form.fields.map

XIOC detected Domain: form.fields.map

extracted_from_files

Domain
detected Domain: structure.forms.map

XIOC detected Domain: structure.forms.map

extracted_from_files

IP
detected Domain: suggestions.tips

XIOC detected Domain: suggestions.tips

extracted_from_files

Domain
detected Domain: formconfig.fieldconfigs.map

XIOC detected Domain: formconfig.fieldconfigs.map

extracted_from_files

Domain
detected Domain: parsedconfig.name

XIOC detected Domain: parsedconfig.name

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: result.data.workflow.id

XIOC detected Domain: result.data.workflow.id

extracted_from_files

Domain
detected Domain: workflowconfig.nodes.map

XIOC detected Domain: workflowconfig.nodes.map

extracted_from_files

Domain
detected Domain: workflowconfig.name

XIOC detected Domain: workflowconfig.name

extracted_from_files

Domain
detected Domain: workflow.steps.map

XIOC detected Domain: workflow.steps.map

extracted_from_files

Domain
detected Domain: workflow.name

XIOC detected Domain: workflow.name

extracted_from_files

Domain
detected Domain: structure.workflows.map

XIOC detected Domain: structure.workflows.map

extracted_from_files

Domain
detected Domain: pkg.metadata.id

XIOC detected Domain: pkg.metadata.id

extracted_from_files

Domain
detected Domain: r.fields.map

XIOC detected Domain: r.fields.map

extracted_from_files

Domain
detected Domain: recommendations.map

XIOC detected Domain: recommendations.map

extracted_from_files

Domain
detected Domain: result.workflow.id

XIOC detected Domain: result.workflow.id

extracted_from_files

Domain
detected Domain: workflownodes.map

XIOC detected Domain: workflownodes.map

extracted_from_files

Domain
detected Domain: n.name

XIOC detected Domain: n.name

extracted_from_files

Domain
detected Domain: validation.warnings.map

XIOC detected Domain: validation.warnings.map

extracted_from_files

Domain
detected Domain: base64.guru

XIOC detected Domain: base64.guru

extracted_from_files

Domain
detected Domain: thekevinscott.com

XIOC detected Domain: thekevinscott.com

extracted_from_files

Domain
detected Domain: stackoverflow.com

XIOC detected Domain: stackoverflow.com

extracted_from_files

Domain
detected Domain: index.js.map

XIOC detected Domain: index.js.map

extracted_from_files

Domain
detected Domain: result.form.id

XIOC detected Domain: result.form.id

extracted_from_files

Domain
detected Domain: icons.map

XIOC detected Domain: icons.map

extracted_from_files

Domain
detected Domain: categories.map

XIOC detected Domain: categories.map

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: pkg.metadata.name

XIOC detected Domain: pkg.metadata.name

extracted_from_files

Domain
detected Domain: workflow.id

XIOC detected Domain: workflow.id

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://netpad.io/settings/api-keys)

XIOC detected URL: https://netpad.io/settings/api-keys)

extracted_from_files

URL
detected URL: https://netpad.io/import/imp_abc123

XIOC detected URL: https://netpad.io/import/imp_abc123

extracted_from_files

URL
detected URL: https://netpad.io/mcp)

XIOC detected URL: https://netpad.io/mcp)

extracted_from_files

URL
detected URL: https://semver.org/spec/v2.0.0.html).

XIOC detected URL: https://semver.org/spec/v2.0.0.html).

extracted_from_files

URL
detected URL: https://keepachangelog.com/en/1.0.0/),

XIOC detected URL: https://keepachangelog.com/en/1.0.0/),

extracted_from_files

Other
detected Email: netpad_extensions=@netpad/${pkg.metadata.id

XIOC detected Email: netpad_extensions=@netpad/${pkg.metadata.id

extracted_from_files

Other
detected Email: netpad_extensions=@netpad/${metadata.id

XIOC detected Email: netpad_extensions=@netpad/${metadata.id

extracted_from_files

URL
detected URL: https://netpad.io)

XIOC detected URL: https://netpad.io)

extracted_from_files

URL
detected URL: https://www.npmjs.com/package/@netpad/workflows)

XIOC detected URL: https://www.npmjs.com/package/@netpad/workflows)

extracted_from_files

URL
detected URL: https://www.npmjs.com/package/@netpad/forms)

XIOC detected URL: https://www.npmjs.com/package/@netpad/forms)

extracted_from_files

URL
detected URL: https://www.npmjs.com/package/@netpad/mcp-server-remote)

XIOC detected URL: https://www.npmjs.com/package/@netpad/mcp-server-remote)

extracted_from_files

URL
detected URL: https://netpad.io/f/bug-report

XIOC detected URL: https://netpad.io/f/bug-report

extracted_from_files

URL
detected URL: https://api.example.com/company?domain=

XIOC detected URL: https://api.example.com/company?domain=

extracted_from_files

URL
detected URL: https://registry.npmjs.org/$

XIOC detected URL: https://registry.npmjs.org/$

extracted_from_files

URL
detected URL: https://your-netpad-instance.com

XIOC detected URL: https://your-netpad-instance.com

extracted_from_files

URL
detected URL: https://docs.netpad.io/docs/extensions/api-reference

XIOC detected URL: https://docs.netpad.io/docs/extensions/api-reference

extracted_from_files

URL
detected URL: https://your-netpad-instance.com',

XIOC detected URL: https://your-netpad-instance.com',

extracted_from_files

URL
detected URL: https://example.com/logo.png

XIOC detected URL: https://example.com/logo.png

extracted_from_files

URL
detected URL: https://mui.com/material-ui/material-icons/

XIOC detected URL: https://mui.com/material-ui/material-icons/

extracted_from_files

URL
detected URL: https://netpad.io/f/$

XIOC detected URL: https://netpad.io/f/$

extracted_from_files

URL
detected URL: https://netpad.io/settings/api-keys

XIOC detected URL: https://netpad.io/settings/api-keys

extracted_from_files

URL
detected URL: https://netpad.io

XIOC detected URL: https://netpad.io

extracted_from_files

URL
detected URL: https://api.netpad.io',

XIOC detected URL: https://api.netpad.io',

extracted_from_files

URL
detected URL: https://api.netpad.io'

XIOC detected URL: https://api.netpad.io'

extracted_from_files

URL
detected URL: https://netpad.io';

XIOC detected URL: https://netpad.io';

extracted_from_files

URL
detected URL: https://docs.google.com/forms/d/.../edit

XIOC detected URL: https://docs.google.com/forms/d/.../edit

extracted_from_files

URL
detected URL: https://docs.google.com/forms/d/

XIOC detected URL: https://docs.google.com/forms/d/

extracted_from_files

URL
detected URL: https://base64.guru/standards/base64url

XIOC detected URL: https://base64.guru/standards/base64url

extracted_from_files

URL
detected URL: https://stackoverflow.com/questions/7860392/determine-if-string-is-in-base64-using-javascript

XIOC detected URL: https://stackoverflow.com/questions/7860392/determine-if-string-is-in-base64-using-javascript

extracted_from_files

URL
detected URL: https://thekevinscott.com/emojis-in-javascript/#writing-a-regular-expression

XIOC detected URL: https://thekevinscott.com/emojis-in-javascript/#writing-a-regular-expression

extracted_from_files

URL
detected URL: https://stackoverflow.com/a/46181/1550155

XIOC detected URL: https://stackoverflow.com/a/46181/1550155

extracted_from_files

URL
detected URL: https://example.com/logo.png',

XIOC detected URL: https://example.com/logo.png',

extracted_from_files

URL
detected URL: https://stackoverflow.com/questions/3966484/why-does-modulus-operator-return-fractional-number-in-javascript/31711034#31711034

XIOC detected URL: https://stackoverflow.com/questions/3966484/why-does-modulus-operator-return-fractional-number-in-javascript/31711034#31711034

extracted_from_files

URL
detected URL: https://stackoverflow.com/a/3143231

XIOC detected URL: https://stackoverflow.com/a/3143231

extracted_from_files

URL
detected URL: https://github.com/mrlynn/netpad-v3/tree/main/packages/mcp-server#readme

XIOC detected URL: https://github.com/mrlynn/netpad-v3/tree/main/packages/mcp-server#readme

extracted_from_files

URL
detected URL: https://github.com/mrlynn/netpad-v3/issues

XIOC detected URL: https://github.com/mrlynn/netpad-v3/issues

extracted_from_files

URL
detected URL: https://github.com/mrlynn/netpad-v3.git

XIOC detected URL: https://github.com/mrlynn/netpad-v3.git

extracted_from_files

URL
detected URL: https://netpad.io/settings/api-keys'

XIOC detected URL: https://netpad.io/settings/api-keys'

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: formdata.email

XIOC detected Domain: formdata.email

extracted_from_files

URL
detected URL: https://netpad.io/import/imp_xyz789

XIOC detected URL: https://netpad.io/import/imp_xyz789

extracted_from_files

Domain
detected Domain: config.target

XIOC detected Domain: config.target

extracted_from_files

Domain
detected Domain: template.edges.map

XIOC detected Domain: template.edges.map

extracted_from_files

Security Analysis Summary

Security Analysis Overview

@netpad/mcp-server is a mcp extension published by merlynn. Version 3.0.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 465 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • Critical: 4 finding(s)
  • High: 118 finding(s)
  • Medium: 340 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

@netpad/mcp-server is published by merlynn on the mcp marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions