Hi team π
I ran a free deep security scan of apify/apify-mcp-server using MCPSafe β a purpose-built scanner for MCP servers using a 5-LLM consensus panel to detect prompt injection risks, over-scoped tool schemas, supply chain issues, and more.
Results: 67/100 Β· Grade B
| Severity |
Count |
| π΄ Critical |
0 |
| π High |
0 |
| π‘ Medium |
62 |
| π’ Low |
0 |
Summary: 62 medium-severity findings around web scraping tool permissions and actor execution scope. No high or critical findings.
π Full report with findings and evidence: https://mcpsafe.io/registry/github/apify/apify-mcp-server
Add a security badge to your README
[](https://mcpsafe.io/registry/github/apify/apify-mcp-server)
This badge auto-updates whenever a new scan runs β great for showing users and enterprise customers your security posture at a glance.
Feel free to close this if you're already tracking these findings. Happy to answer any questions about specific findings.
β Truong BUI Β· mcpsafe.io
Hi team π
I ran a free deep security scan of apify/apify-mcp-server using MCPSafe β a purpose-built scanner for MCP servers using a 5-LLM consensus panel to detect prompt injection risks, over-scoped tool schemas, supply chain issues, and more.
Results: 67/100 Β· Grade B
Summary: 62 medium-severity findings around web scraping tool permissions and actor execution scope. No high or critical findings.
π Full report with findings and evidence: https://mcpsafe.io/registry/github/apify/apify-mcp-server
Add a security badge to your README
This badge auto-updates whenever a new scan runs β great for showing users and enterprise customers your security posture at a glance.
Feel free to close this if you're already tracking these findings. Happy to answer any questions about specific findings.
β Truong BUI Β· mcpsafe.io