Skip to content

Security scan results for apify-mcp-server β€” MCPSafe AIVSS 67/100 (Grade B)Β #834

@mcpsafe-gh

Description

@mcpsafe-gh

Hi team πŸ‘‹

I ran a free deep security scan of apify/apify-mcp-server using MCPSafe β€” a purpose-built scanner for MCP servers using a 5-LLM consensus panel to detect prompt injection risks, over-scoped tool schemas, supply chain issues, and more.

Results: 67/100 Β· Grade B

Severity Count
πŸ”΄ Critical 0
🟠 High 0
🟑 Medium 62
🟒 Low 0

Summary: 62 medium-severity findings around web scraping tool permissions and actor execution scope. No high or critical findings.

πŸ“‹ Full report with findings and evidence: https://mcpsafe.io/registry/github/apify/apify-mcp-server


Add a security badge to your README

[![MCPSafe](https://api.mcpsafe.io/badge/github/apify/apify-mcp-server.svg)](https://mcpsafe.io/registry/github/apify/apify-mcp-server)

This badge auto-updates whenever a new scan runs β€” great for showing users and enterprise customers your security posture at a glance.


Feel free to close this if you're already tracking these findings. Happy to answer any questions about specific findings.

β€” Truong BUI Β· mcpsafe.io

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions