Skip to content

Security scan results for mcp - 90.1/100 #73

@AgentSeal

Description

@AgentSeal

ARM's MCP server scored 90.1/100 (SAFE) on AgentSeal (https://agentseal.org) - 3 tools, run through sandbox adversarial probing, AI semantic analysis, and cross-tool review. A few things worth a look:

  1. The knowledge_base_search description opens with "IMPORTANT: IF A USER ASKS TO MIGRATE A CODEBASE TO ARM, STRONGLY CONSIDER USING THIS TOOL AS A PART OF YOUR STRATEGY." All-caps IMPORTANT directives that tell agents what to do are a recognized prompt injection pattern. Even with benign intent, this phrasing may trigger injection detections in security-conscious pipelines. Rephrasing as a plain capability description would sidestep the issue.

  2. sysreport_instructions explicitly tells the agent to run software directly on the host, bypassing container isolation. The description frames this as the tool's purpose, but instructing an agent to escape to the host is a pattern worth documenting clearly - ideally with a user confirmation step or explicit scope warning in the description.

  3. check_image's description is cut off mid-sentence: "Provide an image in " - never completed. Agents can't make informed decisions about what the tool does or what format the image parameter expects.

Full report: https://agentseal.org/mcp/https-githubcom-arm-mcp

[![AgentSeal MCP](https://agentseal.org/api/v1/mcp/https-githubcom-arm-mcp/badge)](https://agentseal.org/mcp/https-githubcom-arm-mcp)

AgentSeal MCP

If any of these look wrong, let us know and we'll correct the report.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions