<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Michael Kayode Onyekwere</title>
    <description>The latest articles on DEV Community by Michael Kayode Onyekwere (@michael_onyekwere).</description>
    <link>https://dev.to/michael_onyekwere</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3811816%2F04986db6-d6fd-41d5-a2a5-be996dc4580e.png</url>
      <title>DEV Community: Michael Kayode Onyekwere</title>
      <link>https://dev.to/michael_onyekwere</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/michael_onyekwere"/>
    <language>en</language>
    <item>
      <title>AGENTSCORE-2026-0022: `entroly-wasm` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Mon, 04 May 2026 08:20:15 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0022-entroly-wasm-risk-change-detected-c2l</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0022-entroly-wasm-risk-change-detected-c2l</guid>
      <description>&lt;p&gt;entroly-wasm updated from 0.11.0 to 0.12.0. Score changed 95/100 to 80/100 (-15). Risk: LOW to MODERATE. 3 findings.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;entroly-wasm&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 0.11.0 to 0.12.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 95/100 to 80/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; LOW to MODERATE&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[MEDIUM]&lt;/strong&gt; no_repository: Package has no repository link — source code is not verifiable&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[LOW]&lt;/strong&gt; no_license: Package has no licence specified&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[LOW]&lt;/strong&gt; no_provenance: Package is not published with provenance attestations or trusted publishing. Published by: adalako&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0022" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0022&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=entroly-wasm&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>AGENTSCORE-2026-0021: `javaperf` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Sat, 02 May 2026 19:28:09 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0021-javaperf-risk-change-detected-5fne</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0021-javaperf-risk-change-detected-5fne</guid>
      <description>&lt;p&gt;javaperf updated from 1.2.2 to 1.3.0. Score changed 95/100 to 80/100 (-15). Risk: LOW to MODERATE. 1 finding.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;javaperf&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 1.2.2 to 1.3.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 95/100 to 80/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; LOW to MODERATE&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[HIGH]&lt;/strong&gt; command_injection: Potential command injection: shell execution with template literal input&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0021" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0021&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=javaperf&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>AGENTSCORE-2026-0020: `@staticn0va/wigolo` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Fri, 01 May 2026 13:28:21 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0020-staticn0vawigolo-risk-change-detected-37i4</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0020-staticn0vawigolo-risk-change-detected-37i4</guid>
      <description>&lt;p&gt;@staticn0va/wigolo updated from 0.6.6 to 1.0.0. Score changed 80/100 to 70/100 (-10). Risk: MODERATE to MODERATE. 2 findings.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;@staticn0va/wigolo&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 0.6.6 to 1.0.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 80/100 to 70/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; MODERATE to MODERATE&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[MEDIUM]&lt;/strong&gt; excessive_dependencies: Package has 26 runtime dependencies (high attack surface)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[HIGH]&lt;/strong&gt; command_injection: Potential command injection: shell execution with template literal input&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0020" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0020&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=%40staticn0va%2Fwigolo&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>Four MCP packages, four ways the supply chain shifted in two weeks of npm monitoring</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Fri, 01 May 2026 01:11:38 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/four-mcp-packages-four-ways-the-supply-chain-shifted-in-two-weeks-of-npm-monitoring-1b6o</link>
      <guid>https://dev.to/michael_onyekwere/four-mcp-packages-four-ways-the-supply-chain-shifted-in-two-weeks-of-npm-monitoring-1b6o</guid>
      <description>&lt;h1&gt;
  
  
  Four MCP packages, four ways the supply chain shifted in two weeks of npm monitoring
&lt;/h1&gt;

&lt;p&gt;By Michael K Onyekwere&lt;/p&gt;

&lt;p&gt;I monitor nearly a thousand published MCP packages on npm in real time. The pipeline polls the npm changes feed every two minutes, scans every newly-published version, and writes the result against the previous baseline. When a real package update drops the score below the confidence threshold, a public advisory is generated and the RSS feed updates.&lt;/p&gt;

&lt;p&gt;This post collects four worked examples from the last two weeks. The named packages are not malicious. The point is to make visible the kinds of routine changes a consumer would never see at install time, because the install path is &lt;code&gt;npx -y &amp;lt;package&amp;gt;&lt;/code&gt; or an equivalent unpinned &lt;code&gt;npm install&lt;/code&gt; that always pulls whatever version is current on the registry.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. prism-mcp-server: four capabilities added in one major version bump
&lt;/h2&gt;

&lt;p&gt;This is the strongest single drift event of the period.&lt;/p&gt;

&lt;p&gt;On 2026-04-27 the watch feed had &lt;code&gt;prism-mcp-server&lt;/code&gt; at version 11.6.0 with score 85 / 100, risk LOW, no findings beyond a missing-provenance note.&lt;/p&gt;

&lt;p&gt;On 2026-04-28 11:44 UTC the same package republished as version 12.5.0. The watch detect logged the diff under two seconds later. The rescan produced:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Score 85 to 65, risk LOW to ELEVATED&lt;/li&gt;
&lt;li&gt;New HIGH &lt;code&gt;command_injection&lt;/code&gt; finding: shell execution with template-literal input&lt;/li&gt;
&lt;li&gt;New MEDIUM &lt;code&gt;excessive_dependencies&lt;/code&gt; finding: 23 runtime dependencies (was lower in v11)&lt;/li&gt;
&lt;li&gt;Capability surface gained four categories that did not exist in the prior major version:

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;browser_automation&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;email_messaging&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;filesystem_read&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;shell_exec&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;Consider the consumer position. Anyone with &lt;code&gt;prism-mcp-server&lt;/code&gt; installed via the typical agent-config form (&lt;code&gt;npx -y prism-mcp-server&lt;/code&gt; in &lt;code&gt;claude_desktop_config.json&lt;/code&gt; or equivalent) had their agent silently inherit four new capability categories the moment 12.5.0 hit npm. No review trigger. No opt-in. No diff against what was previously authorised.&lt;/p&gt;

&lt;p&gt;This is not a story about prism-mcp-server's publisher doing something wrong. Major version bumps are exactly when a maintainer is allowed to reshape the surface area. The point is that the consumer has no mechanism in place to notice it.&lt;/p&gt;

&lt;p&gt;The advisory &lt;code&gt;AGENTSCORE-2026-0017&lt;/code&gt; covers this case. RSS feed picked it up the same minute.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. agent-planner-mcp: four versions in nine hours
&lt;/h2&gt;

&lt;p&gt;A different shape of the same problem.&lt;/p&gt;

&lt;p&gt;On 2026-04-25 &lt;code&gt;agent-planner-mcp&lt;/code&gt; published four times in a single day:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;13:44 UTC: v0.8.1&lt;/li&gt;
&lt;li&gt;18:10 UTC: v0.9.0&lt;/li&gt;
&lt;li&gt;19:14 UTC: v0.9.1&lt;/li&gt;
&lt;li&gt;22:44 UTC: v1.0.0&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The score held at 75 / MODERATE across all four publishes. No major findings change. But each release shifted what tools the package exposed.&lt;/p&gt;

&lt;p&gt;If you reviewed v0.8.1 in the morning and were happy with what it had, by the end of the day there had been three additional surface changes you never saw, and the package had crossed a major-version boundary (v1.0.0). A &lt;code&gt;npx -y&lt;/code&gt; install on a tool that depends on agent-planner-mcp would land on whichever version was current at install time, with no way to relate that version to the one that was reviewed.&lt;/p&gt;

&lt;p&gt;This is the same pattern observed earlier in the period with &lt;code&gt;@planu/cli&lt;/code&gt;, which on 2026-04-22 shipped v1.84.0 with four new capabilities (&lt;code&gt;database_access&lt;/code&gt;, &lt;code&gt;filesystem_read&lt;/code&gt;, &lt;code&gt;search_index&lt;/code&gt;, &lt;code&gt;unknown&lt;/code&gt;) and a HIGH &lt;code&gt;command_injection&lt;/code&gt; finding, then walked the change back in v1.85.0 forty-six minutes later by removing all four capabilities. A consumer running &lt;code&gt;npx -y @planu/cli&lt;/code&gt; during that forty-six-minute window would have got the expanded surface; one running it forty-seven minutes later would have got the walked-back version. Neither knew.&lt;/p&gt;

&lt;p&gt;Two instances in two weeks rules out coincidence. Maintainers iterating in real time is normal and healthy. Consumers having no view of the iteration is the gap.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. sverklo: a quiet package, then a backlog-dump release that opens a new HIGH
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;sverklo&lt;/code&gt; had been at v0.12.5 with score 80 / MODERATE since 2026-04-19, carrying one HIGH &lt;code&gt;command_injection&lt;/code&gt; finding for nearly a week.&lt;/p&gt;

&lt;p&gt;On 2026-04-25 at 20:56 UTC the package published v0.16.0. Four minor versions in one go, the kind of release that signals a maintainer clearing a backlog. The diff:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Score 80 to 60 (MODERATE to ELEVATED)&lt;/li&gt;
&lt;li&gt;The existing HIGH &lt;code&gt;command_injection&lt;/code&gt; is still present&lt;/li&gt;
&lt;li&gt;A new HIGH &lt;code&gt;unsafe_eval&lt;/code&gt; finding has appeared&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Two HIGH findings now, where there was one before, on the same package, after a single release.&lt;/p&gt;

&lt;p&gt;This inverts a common assumption. Maintainer activity is generally treated as a positive signal in npm review heuristics: actively maintained beats abandoned. In MCP specifically, a long backlog released as one big version-skip publish expands the surface a consumer was reviewing against. The longer the gap, the wider the change in the catch-up release.&lt;/p&gt;

&lt;p&gt;If your review of &lt;code&gt;sverklo&lt;/code&gt; was based on v0.12.5, your review is now stale by two HIGH findings.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. nodebench-mcp: the case where the maintainer pushed back, and the scanner got better
&lt;/h2&gt;

&lt;p&gt;A different shape from the three above. This one shows what the feedback loop looks like when it works.&lt;/p&gt;

&lt;p&gt;The scanner flagged &lt;code&gt;nodebench-mcp&lt;/code&gt; v3.2.0 with two HIGH findings: &lt;code&gt;command_injection&lt;/code&gt; and &lt;code&gt;unsafe_eval&lt;/code&gt;. I filed a public issue on the maintainer's repo.&lt;/p&gt;

&lt;p&gt;The maintainer (HomenShum) reviewed both findings against source on 2026-04-26 and posted a detailed response. They:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Confirmed three real &lt;code&gt;command_injection&lt;/code&gt; sites at specific file:line references and refactored each one to argv-based &lt;code&gt;spawn&lt;/code&gt; with &lt;code&gt;shell: false&lt;/code&gt;. Released as v3.2.1.&lt;/li&gt;
&lt;li&gt;Identified the &lt;code&gt;unsafe_eval&lt;/code&gt; finding as a false positive with specific evidence: the regex matched &lt;code&gt;db.exec(\&lt;/code&gt;SQL ${var}&lt;code&gt;)&lt;/code&gt; which is &lt;code&gt;better-sqlite3&lt;/code&gt;'s tagged-template SQL, not JavaScript &lt;code&gt;eval&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The maintainer was right on both counts. The first three sites were genuinely exploitable in the agent-controllable input model and got fixed properly. The fourth was a scanner precision gap that we should not have been flagging.&lt;/p&gt;

&lt;p&gt;Same day, two scanner mitigators shipped (commit &lt;code&gt;4ee2659&lt;/code&gt;):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Database-shaped variable names calling &lt;code&gt;.exec()&lt;/code&gt; (&lt;code&gt;db&lt;/code&gt;, &lt;code&gt;database&lt;/code&gt;, &lt;code&gt;conn&lt;/code&gt;, &lt;code&gt;client&lt;/code&gt;, &lt;code&gt;pool&lt;/code&gt;, &lt;code&gt;prepared&lt;/code&gt;, &lt;code&gt;stmt&lt;/code&gt;, &lt;code&gt;sql&lt;/code&gt;, &lt;code&gt;query&lt;/code&gt;, &lt;code&gt;knex&lt;/code&gt;, &lt;code&gt;prisma&lt;/code&gt;) now downgrade &lt;code&gt;command_injection&lt;/code&gt; to LOW&lt;/li&gt;
&lt;li&gt;Files whose names contain the substring &lt;code&gt;Eval&lt;/code&gt; followed by an uppercase letter (&lt;code&gt;selfEvalTools.js&lt;/code&gt;, &lt;code&gt;llmJudgeEval.js&lt;/code&gt;) now downgrade &lt;code&gt;unsafe_eval&lt;/code&gt; to LOW because in those files the literal word &lt;code&gt;eval&lt;/code&gt; appears inside English-language strings describing the evaluation flow, not in actual JavaScript &lt;code&gt;eval()&lt;/code&gt; calls&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After the maintainer's PR landed and the mitigators shipped, &lt;code&gt;nodebench-mcp@3.2.1&lt;/code&gt; rescanned at 85 / LOW, up from 55 / ELEVATED. The full mitigator changelog is at &lt;code&gt;agentscores.xyz/scanner/precision&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;That is the feedback loop you want from a security tool. Public review goes both ways. Real findings get fixed. Scanner mistakes get challenged with evidence. The scanner improves.&lt;/p&gt;

&lt;h2&gt;
  
  
  What this looks like to a consumer
&lt;/h2&gt;

&lt;p&gt;If you are running &lt;code&gt;npx -y&lt;/code&gt; against any MCP package in a Claude Desktop, Cursor, Continue, OpenAI agents, or custom MCP client config:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Your agent's capability surface is whatever the latest version of every transitive package decided to expose at install time. You did not approve it. It came along for the ride.&lt;/li&gt;
&lt;li&gt;A major-version bump is allowed to reshape that surface entirely. v11 to v12 in a published package can mean +4 capabilities, a new HIGH finding, or nothing at all. There is no way to tell from the install command which it will be.&lt;/li&gt;
&lt;li&gt;Multiple publishes in one day are normal during active development of an MCP package, and each one can add or remove tools. Pinning to a version reviewed in the morning does not protect you from the version reshape that landed at 22:44.&lt;/li&gt;
&lt;li&gt;A long quiet period followed by a multi-version-skip release is one of the riskier patterns, because the catch-up release folds in surface changes that would have been flagged separately across the missing reviews.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What helps
&lt;/h2&gt;

&lt;p&gt;The cheapest defence is to pin every MCP package to a specific version in your agent config. Never &lt;code&gt;npx -y package&lt;/code&gt;, always &lt;code&gt;npx -y package@x.y.z&lt;/code&gt;. Treat the pin like a lockfile entry. This is what the team at &lt;code&gt;redis/RedisInsight&lt;/code&gt; did across every MCP dependency in their config after our scan flagged the unpinned installs (&lt;code&gt;agentscores.xyz/case-study/redis&lt;/code&gt;).&lt;/p&gt;

&lt;p&gt;Beyond that, the public RSS feed at &lt;code&gt;agentscores.xyz/security/advisories&lt;/code&gt; carries every advisory as it lands, with score before, score after, version diff, and findings. If a package you depend on appears, you have minutes to evaluate the change before it hits your next install.&lt;/p&gt;

&lt;p&gt;For teams that want enforcement rather than awareness, the policy gate at &lt;code&gt;agentscores.xyz/policy-gate&lt;/code&gt; is a free GitHub Action that fails the build when an MCP dependency drops below the configured threshold. Repo-scoped exceptions land in the audit trail when you decide to accept a finding, rather than landing nowhere.&lt;/p&gt;

&lt;h2&gt;
  
  
  What the dataset shows
&lt;/h2&gt;

&lt;p&gt;Across nearly a thousand monitored MCP packages, the npm changes feed is processed every two minutes around the clock. The watch cron sees roughly 1,000 to 2,000 monitored-package publish events per day. Most are version bumps with no meaningful score change. About 1 to 3 per day clear the confidence threshold and become public advisories. A few of those each week involve a new HIGH or CRITICAL finding.&lt;/p&gt;

&lt;p&gt;Several per week worth knowing about. None of them malicious. All of them shape what an agent built on these packages can do, without notifying anyone downstream.&lt;/p&gt;

&lt;p&gt;If you maintain or consume MCP packages and want to talk about any of this, the contact form at &lt;code&gt;agentscores.xyz/contact&lt;/code&gt; reaches me directly.&lt;/p&gt;




&lt;p&gt;By Michael K Onyekwere. AgentScore is a continuously-updated trust layer for the MCP ecosystem. The dataset, scanner, advisory feed, and policy gate are at agentscores.xyz. The full ruleset history and the public report that motivated each precision change is at agentscores.xyz/scanner/precision.&lt;/p&gt;

</description>
      <category>security</category>
      <category>supplychain</category>
      <category>mcp</category>
      <category>npm</category>
    </item>
    <item>
      <title>AGENTSCORE-2026-0019: `@cg3/prior-mcp` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Fri, 01 May 2026 00:48:35 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0019-cg3prior-mcp-risk-change-detected-2p2b</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0019-cg3prior-mcp-risk-change-detected-2p2b</guid>
      <description>&lt;p&gt;@cg3/prior-mcp updated from 0.6.4 to 0.7.0. Score changed 100/100 to 75/100 (-25). Risk: LOW to MODERATE. 2 findings.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;@cg3/prior-mcp&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 0.6.4 to 0.7.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 100/100 to 75/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; LOW to MODERATE&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[HIGH]&lt;/strong&gt; command_injection: Potential command injection: shell execution with template literal input&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[LOW]&lt;/strong&gt; no_provenance: Package is not published with provenance attestations or trusted publishing. Published by: cg3llc&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0019" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0019&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=%40cg3%2Fprior-mcp&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>AGENTSCORE-2026-0018: `@planu/cli` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Thu, 30 Apr 2026 22:18:10 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0018-planucli-risk-change-detected-3ng</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0018-planucli-risk-change-detected-3ng</guid>
      <description>&lt;p&gt;&lt;a class="mentioned-user" href="https://dev.to/planu"&gt;@planu&lt;/a&gt;/cli updated from 2.12.0 to 2.12.1. Score changed 85/100 to 65/100 (-20). Risk: LOW to ELEVATED. 3 findings.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;@planu/cli&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 2.12.0 to 2.12.1&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 85/100 to 65/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; LOW to ELEVATED&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[MEDIUM]&lt;/strong&gt; no_repository: Package has no repository link — source code is not verifiable&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[HIGH]&lt;/strong&gt; command_injection: Potential command injection: shell execution with template literal input&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[LOW]&lt;/strong&gt; no_provenance: Package is not published with provenance attestations or trusted publishing. Published by: planudev&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0018" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0018&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=%40planu%2Fcli&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>AGENTSCORE-2026-0017: `prism-mcp-server` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Tue, 28 Apr 2026 11:44:15 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0017-prism-mcp-server-risk-change-detected-48na</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0017-prism-mcp-server-risk-change-detected-48na</guid>
      <description>&lt;p&gt;prism-mcp-server updated from 11.6.0 to 12.5.0. Score changed 85/100 to 65/100 (-20). Risk: LOW to ELEVATED. 3 findings.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;prism-mcp-server&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 11.6.0 to 12.5.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 85/100 to 65/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; LOW to ELEVATED&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[MEDIUM]&lt;/strong&gt; excessive_dependencies: Package has 23 runtime dependencies (high attack surface)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[HIGH]&lt;/strong&gt; command_injection: Potential command injection: shell execution with template literal input&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[LOW]&lt;/strong&gt; no_provenance: Package is not published with provenance attestations or trusted publishing. Published by: dmitricostenco&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0017" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0017&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=prism-mcp-server&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>AGENTSCORE-2026-0016: `@jtalk22/slack-mcp` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Sun, 26 Apr 2026 15:46:09 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0016-jtalk22slack-mcp-risk-change-detected-j31</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0016-jtalk22slack-mcp-risk-change-detected-j31</guid>
      <description>&lt;p&gt;&lt;a class="mentioned-user" href="https://dev.to/jtalk22"&gt;@jtalk22&lt;/a&gt;/slack-mcp updated from 4.1.2 to 4.2.0. Score changed 90/100 to 80/100 (-10). Risk: LOW to MODERATE. 1 finding.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;@jtalk22/slack-mcp&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 4.1.2 to 4.2.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 90/100 to 80/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; LOW to MODERATE&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[HIGH]&lt;/strong&gt; command_injection: Potential command injection: shell execution with template literal input&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0016" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0016&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=%40jtalk22%2Fslack-mcp&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>AGENTSCORE-2026-0015: `sverklo` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Sat, 25 Apr 2026 19:56:12 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0015-sverklo-risk-change-detected-4k6g</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0015-sverklo-risk-change-detected-4k6g</guid>
      <description>&lt;p&gt;sverklo updated from 0.12.5 to 0.16.0. Score changed 80/100 to 60/100 (-20). Risk: MODERATE to ELEVATED. 2 findings.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;sverklo&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 0.12.5 to 0.16.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 80/100 to 60/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; MODERATE to ELEVATED&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[HIGH]&lt;/strong&gt; command_injection: Potential command injection: shell execution with template literal input&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[HIGH]&lt;/strong&gt; unsafe_eval: Uses eval() with dynamic input&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0015" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0015&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=sverklo&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>AGENTSCORE-2026-0014: `aidex-mcp` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Sat, 25 Apr 2026 15:04:13 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0014-aidex-mcp-risk-change-detected-59ie</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0014-aidex-mcp-risk-change-detected-59ie</guid>
      <description>&lt;p&gt;aidex-mcp updated from 1.17.1 to 1.18.0. Score changed 70/100 to 60/100 (-10). Risk: MODERATE to ELEVATED. 4 findings.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;aidex-mcp&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 1.17.1 to 1.18.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 70/100 to 60/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; MODERATE to ELEVATED&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[LOW]&lt;/strong&gt; install_script: Package has 'postinstall' script: node scripts/postinstall.mjs&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[MEDIUM]&lt;/strong&gt; excessive_dependencies: Package has 21 runtime dependencies (high attack surface)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[HIGH]&lt;/strong&gt; command_injection: Potential command injection: shell execution with template literal input&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[LOW]&lt;/strong&gt; no_provenance: Package is not published with provenance attestations or trusted publishing. Published by: uchalas&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0014" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0014&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=aidex-mcp&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>AGENTSCORE-2026-0013: `vaultpilot-mcp` risk change detected</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Sat, 25 Apr 2026 14:32:10 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/agentscore-2026-0013-vaultpilot-mcp-risk-change-detected-4jhc</link>
      <guid>https://dev.to/michael_onyekwere/agentscore-2026-0013-vaultpilot-mcp-risk-change-detected-4jhc</guid>
      <description>&lt;p&gt;vaultpilot-mcp updated from 0.7.0 to 0.8.0. Score changed 95/100 to 85/100 (-10). Risk: LOW to LOW. 2 findings.&lt;/p&gt;

&lt;h2&gt;
  
  
  Package
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Name:&lt;/strong&gt; &lt;code&gt;vaultpilot-mcp&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version:&lt;/strong&gt; 0.7.0 to 0.8.0&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Score:&lt;/strong&gt; 95/100 to 85/100&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk:&lt;/strong&gt; LOW to LOW&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Findings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;[LOW]&lt;/strong&gt; install_script: Package has 'postinstall' script: patch-package&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;[MEDIUM]&lt;/strong&gt; excessive_dependencies: Package has 21 runtime dependencies (high attack surface)&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Full advisory: &lt;a href="https://agentscores.xyz/security/advisories#AGENTSCORE-2026-0013" rel="noopener noreferrer"&gt;AGENTSCORE-2026-0013&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Verdict API: &lt;code&gt;curl https://agentscores.xyz/api/verdict?npm=vaultpilot-mcp&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Auto-published by &lt;a href="https://agentscores.xyz" rel="noopener noreferrer"&gt;AgentScore&lt;/a&gt; MCP security monitoring.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>mcp</category>
      <category>npm</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>Continuous monitoring caught a credential leak in a published MCP package. Six republishes later, it is still there.</title>
      <dc:creator>Michael Kayode Onyekwere</dc:creator>
      <pubDate>Sat, 25 Apr 2026 07:13:32 +0000</pubDate>
      <link>https://dev.to/michael_onyekwere/continuous-monitoring-caught-a-credential-leak-in-a-published-mcp-package-six-republishes-later-3app</link>
      <guid>https://dev.to/michael_onyekwere/continuous-monitoring-caught-a-credential-leak-in-a-published-mcp-package-six-republishes-later-3app</guid>
      <description>&lt;h1&gt;
  
  
  Continuous monitoring caught a credential leak in a published MCP package. Six republishes later, it is still there.
&lt;/h1&gt;

&lt;p&gt;This is a disclosure writeup. It describes the case at the class level only. No credential values are quoted anywhere in this post.&lt;/p&gt;

&lt;h2&gt;
  
  
  What was found
&lt;/h2&gt;

&lt;p&gt;The package is &lt;code&gt;fa-mcp-sdk&lt;/code&gt; on npm. It is distributed as a Model Context Protocol SDK, which means it is installed by agent-framework tooling (Claude, Cursor, OpenAI agents, custom MCP clients) typically via &lt;code&gt;npm install fa-mcp-sdk&lt;/code&gt; or &lt;code&gt;npx -y fa-mcp-sdk&lt;/code&gt;. Because that install path runs without manual review in most agent setups, anything inside the published tarball reaches consumers immediately on first install.&lt;/p&gt;

&lt;p&gt;On 2026-04-19 a continuous scanner I run flagged the package on a fresh publish. The score dropped sharply, and the finding type was &lt;code&gt;hardcoded_secret&lt;/code&gt; at &lt;code&gt;critical&lt;/code&gt; severity. On manual review I found a file at &lt;code&gt;package/config/local.yaml&lt;/code&gt; containing real production credentials. The classes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An OpenAI / LiteLLM API key tied to a named user at an internal LLM gateway&lt;/li&gt;
&lt;li&gt;An Active Directory service-account username and password covering four LDAP controllers across two production domains in a financial-services estate&lt;/li&gt;
&lt;li&gt;Consul ACL tokens for both dev and prod data centres&lt;/li&gt;
&lt;li&gt;A Postgres superuser password&lt;/li&gt;
&lt;li&gt;A JWT encryption key&lt;/li&gt;
&lt;li&gt;A basic-auth password&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The combination is what makes this severe, not any single credential. The LDAP service account alone gives an attacker bind access to enumerate the entire Active Directory of the affected organisation. The Consul prod token likely exposes further secrets in their KV store. The Postgres superuser password is direct database access on a financial-services platform. Anyone who installed the package and read it had everything needed to map the network, escalate privileges, and exfiltrate data.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why MCP supply chain is structurally different
&lt;/h2&gt;

&lt;p&gt;Regular npm supply chain has a 20-year body of guidance, lockfiles, audit tooling, and review culture around it. MCP is new, and four properties of how MCP packages are typically used make the threat model materially worse:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;No lockfiles in most MCP client configs.&lt;/strong&gt; Claude Desktop, Cursor, and similar agent frontends launch MCP servers from a config file that uses &lt;code&gt;npx -y&lt;/code&gt; with no version pin. Every restart pulls latest. The npm ecosystem solved this with &lt;code&gt;package-lock.json&lt;/code&gt; years ago; MCP has not yet picked it up.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Install paths bypass review.&lt;/strong&gt; When an agent framework starts an MCP server, no human looks at what was installed. The pattern is closer to running a remote shell command than installing a dependency. Any code in the published tarball runs on the consumer's machine the first time the agent boots.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The capability surface is opaque.&lt;/strong&gt; A typical npm dependency exposes functions a developer chooses to import. An MCP package declares a set of tools that the agent can autonomously decide to call. Adding &lt;code&gt;email_messaging&lt;/code&gt; or &lt;code&gt;shell_exec&lt;/code&gt; between minor versions is a meaningful scope change that consumers rarely notice.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Publisher posture is patchy.&lt;/strong&gt; Many MCP packages have no provenance attestations, no repository link, no published security contact, no release pipeline that excludes config files. Across 880 currently-monitored MCP packages, missing-provenance is by far the most common finding type, accounting for 64% of all flagged issues.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Put together, an unpinned &lt;code&gt;npx -y&lt;/code&gt; install of an MCP package gives the publisher more authority over the consumer's runtime than a typical npm dependency does, with less review and less visibility.&lt;/p&gt;

&lt;h2&gt;
  
  
  The disclosure timeline
&lt;/h2&gt;

&lt;p&gt;I held the public disclosure for six days while attempting private remediation through several channels. None worked.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Date (UTC)&lt;/th&gt;
&lt;th&gt;Action&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;2026-04-19&lt;/td&gt;
&lt;td&gt;First private email to the maintainer's published npm contact address with the full credential list and recommended remediation (unpublish, rotate, add &lt;code&gt;.npmignore&lt;/code&gt;). No reply.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2026-04-19 / 20&lt;/td&gt;
&lt;td&gt;Maintainer published 0.4.58 and 0.4.59. &lt;code&gt;local.yaml&lt;/code&gt; unchanged.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2026-04-20&lt;/td&gt;
&lt;td&gt;Second private email to the maintainer's GitHub-listed email address, citing the file path explicitly. No reply.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2026-04-20&lt;/td&gt;
&lt;td&gt;Third (urgent) private email listing four of the six credential values verbatim, in case the previous emails had not been read carefully. No reply.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2026-04-22&lt;/td&gt;
&lt;td&gt;Maintainer published 0.4.69. A sanitised template was added at &lt;code&gt;_local.yaml&lt;/code&gt;, but the original &lt;code&gt;local.yaml&lt;/code&gt; was left in place. So the maintainer touched the same directory and still left the file.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2026-04-22&lt;/td&gt;
&lt;td&gt;Escalation email to &lt;code&gt;security@npmjs.com&lt;/code&gt; requesting a force-unpublish of the affected versions or a registry-level advisory. No (visible) action.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2026-04-23&lt;/td&gt;
&lt;td&gt;Maintainer published 0.4.70 and 0.4.71. File still present.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2026-04-25&lt;/td&gt;
&lt;td&gt;Public class-level GitHub issue filed on the affected repository. AgentScore advisory &lt;code&gt;AGENTSCORE-2026-0012&lt;/code&gt; published. CVE request submitted to GitHub Security Lab.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;I extracted the latest published tarball (0.4.71) on 2026-04-25 to verify before going public. Ten of the original credential pattern matches were still present in &lt;code&gt;package/config/local.yaml&lt;/code&gt;. Same file, same values, six republishes since the first private disclosure.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I think happened internally
&lt;/h2&gt;

&lt;p&gt;This is speculation, but it fits the visible pattern. Someone at the maintainer organisation added &lt;code&gt;_local.yaml&lt;/code&gt; (the underscore-prefixed sanitised template) to the &lt;code&gt;config/&lt;/code&gt; directory, probably in response to one of my emails or an internal review. That same person, or a different person, did not notice or did not act on the original &lt;code&gt;local.yaml&lt;/code&gt; sitting next to it. The publish pipeline ships the entire &lt;code&gt;config/&lt;/code&gt; directory unconditionally, so every subsequent release continues to leak the credentials regardless of any other code changes shipped alongside.&lt;/p&gt;

&lt;p&gt;If that read is right, the actual fix is one line in &lt;code&gt;package.json&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="nl"&gt;"files"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="s2"&gt;"dist"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="s2"&gt;"README.md"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Or one entry in &lt;code&gt;.npmignore&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="s"&gt;config/local.yaml&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That one-line change has not landed across six versions and six days. Whatever process the maintainer organisation has for receiving and acting on security reports has not produced a remediation in this window.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where this sits in the broader MCP ecosystem
&lt;/h2&gt;

&lt;p&gt;Numbers are from the live AgentScore monitoring dataset on 2026-04-25, covering 880 MCP packages on npm and 9,129 scans on record:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Across the most recent 500 scans, 87% of MCP packages produce at least one finding. Most of those findings are not vulnerabilities; they are verifiability gaps (&lt;code&gt;no_provenance&lt;/code&gt;, &lt;code&gt;no_repository&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;no_provenance&lt;/code&gt; accounts for 64% of all findings. The MCP ecosystem has not yet adopted npm provenance attestations at scale.&lt;/li&gt;
&lt;li&gt;Source-code findings are rarer but present: &lt;code&gt;command_injection&lt;/code&gt; patterns appear in 10% of findings, &lt;code&gt;unsafe_eval&lt;/code&gt; in 2%, &lt;code&gt;excessive_dependencies&lt;/code&gt; in 1%.&lt;/li&gt;
&lt;li&gt;8.6% of 720 sampled packages publish at least one install-time script. Most are benign banners; the pattern is a known supply-chain vector either way.&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;hardcoded_secret&lt;/code&gt; is the rarest finding type the scanner produces, and after the April 22 v2.1 update added context-aware downgrade for test fixtures, it surfaces only on packages with genuine credential exposure. In a recent 500-scan sample with that downgrade applied, zero packages flagged for it. That is what makes the &lt;code&gt;fa-mcp-sdk&lt;/code&gt; case unusual: real credentials in a published tarball, not a test fixture.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The risk distribution across the monitored set is healthy overall: 85% of packages score LOW, 12% MODERATE, 2% ELEVATED, 0.5% HIGH. The supply-chain attack surface for MCP is not concentrated in the average package; it is concentrated in the long tail. Continuous monitoring exists to surface that tail.&lt;/p&gt;

&lt;h2&gt;
  
  
  Lessons for MCP consumers
&lt;/h2&gt;

&lt;p&gt;If you install MCP packages without pinning, this is the kind of thing that ends up on disk in your build environment. Four concrete moves:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Pin your MCP dependencies to exact versions.&lt;/strong&gt; Do not use &lt;code&gt;npx -y&lt;/code&gt; or open ranges. The Redis team did this for RedisInsight in April 2026 after a separate scan report flagged five unpinned MCP packages there. Two days from report to every MCP version pinned in their config. The full case is at &lt;a href="https://agentscores.xyz/case-study/redis" rel="noopener noreferrer"&gt;agentscores.xyz/case-study/redis&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Treat install scripts on MCP packages as a manual-review gate.&lt;/strong&gt; Most are benign banners, but the pattern is a classic supply-chain vector. The Policy Gate flags their presence so a human decides.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Re-evaluate capability changes between version bumps.&lt;/strong&gt; A package that adds &lt;code&gt;email_messaging&lt;/code&gt;, &lt;code&gt;filesystem_write&lt;/code&gt;, or &lt;code&gt;shell_exec&lt;/code&gt; between minor versions is a scope change, not a routine update. The Agions case at &lt;a href="https://agentscores.xyz/case-study/agions" rel="noopener noreferrer"&gt;agentscores.xyz/case-study/agions&lt;/a&gt; shows what a four-day arc looks like when a maintainer engages: scan report, targeted patch in 48h, then a major-version structural cleanup that removed seven capabilities from the tool surface.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Watch a public advisory feed for the packages you have in your inventory.&lt;/strong&gt; Score drops on packages already installed are the early-warning signal. RSS at &lt;a href="https://agentscores.xyz/security/advisories/rss.xml" rel="noopener noreferrer"&gt;agentscores.xyz/security/advisories/rss.xml&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The two case studies above bracket the full range of maintainer responses we have seen. Most maintainers, when their package is flagged, behave like Redis or Agions. The &lt;code&gt;fa-mcp-sdk&lt;/code&gt; case is what continuous monitoring catches in the rare instance where they do not.&lt;/p&gt;

&lt;h2&gt;
  
  
  How this got caught
&lt;/h2&gt;

&lt;p&gt;The scanner that flagged &lt;code&gt;fa-mcp-sdk&lt;/code&gt; on its first publish runs continuously over the npm registry feed. It is not a manual research project, and it does not require the maintainer to opt in. When a new version of any monitored MCP package is published, the scanner has a result within minutes. That detection mechanism is what made the six-republishes-in-six-days timeline visible. Without continuous monitoring, the only way to find a credential leak in a tarball is for an individual consumer to manually inspect what they installed, which essentially never happens. Full advisory at &lt;a href="https://agentscores.xyz/security/advisories" rel="noopener noreferrer"&gt;agentscores.xyz/security/advisories&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  What happens next
&lt;/h2&gt;

&lt;p&gt;If &lt;code&gt;fa-mcp-sdk@0.4.72&lt;/code&gt; ships with &lt;code&gt;local.yaml&lt;/code&gt; removed and the credentials rotated, the AgentScore monitor will detect the change and the advisory will move to a resolved state. If not, the GitHub Security Lab CVE request and the resulting GitHub Advisory Database entry will route the finding into Dependabot, Snyk, Socket, and the rest of the dependency-scanning ecosystem automatically. Either path closes the consumer exposure.&lt;/p&gt;

&lt;p&gt;If you maintain an MCP package: please add &lt;code&gt;config/local*.yaml&lt;/code&gt;, &lt;code&gt;.env&lt;/code&gt;, and any local development config files to &lt;code&gt;.npmignore&lt;/code&gt; or to the &lt;code&gt;files&lt;/code&gt; array in &lt;code&gt;package.json&lt;/code&gt; today. The pattern in this case is preventable with a one-line change, and the cost of getting it wrong scales with how many people install the package.&lt;/p&gt;

&lt;p&gt;References:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AgentScore advisory &lt;code&gt;AGENTSCORE-2026-0012&lt;/code&gt;: &lt;a href="https://agentscores.xyz/security/advisories" rel="noopener noreferrer"&gt;agentscores.xyz/security/advisories&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;AgentScore scan report: &lt;a href="https://agentscores.xyz/report/fa-mcp-sdk" rel="noopener noreferrer"&gt;agentscores.xyz/report/fa-mcp-sdk&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Public GitHub issue with the disclosure timeline: &lt;a href="https://github.com/Bazilio-san/fa-mcp-sdk/issues/3" rel="noopener noreferrer"&gt;Bazilio-san/fa-mcp-sdk#3&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ecosystem statistics report (April 2026): &lt;a href="https://agentscores.xyz/research/mcp-ecosystem-april-2026" rel="noopener noreferrer"&gt;agentscores.xyz/research/mcp-ecosystem-april-2026&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>security</category>
      <category>supplychain</category>
      <category>mcp</category>
      <category>npm</category>
    </item>
  </channel>
</rss>
