Skip to content

Conversation

@lwsinclair
Copy link

Hi there,

This pull request shares a security update on deno-mcp-template.

We also have an entry for deno-mcp-template in our directory, MseeP.ai, where we provide regular security and trust updates on your app.

We invite you to add our badge for your MCP server to your README to help your users learn from a third party that provides ongoing validation of deno-mcp-template.

You can easily take control over your listing for free: visit it at https://mseep.ai/app/phughesmcr-deno-mcp-template.

Yours Sincerely,

Lawrence W. Sinclair
CEO/SkyDeck AI
Founder of MseeP.ai
MCP servers you can trust


MseeP.ai Security Assessment Badge

Here are our latest evaluation results of deno-mcp-template

Security Scan Results

Security Score: 100/100

Risk Level: low

Scan Date: 2025-06-19

Score starts at 100, deducts points for security issues, and adds points for security best practices

This security assessment was conducted by MseeP.ai, an independent security validation service for MCP servers. Visit our website to learn more about our security reviews.

@lwsinclair lwsinclair requested a review from phughesmcr as a code owner July 7, 2025 04:46
@phughesmcr
Copy link
Owner

Running the server as-is is highly insecure and not recommended for production without changes. E.g:

  • The template runs using deno run -A which bypasses all Deno's run-time permissions
  • The template uses Anthropic's demo inMemoryEventStore which is not recommended for production use
  • The template uses Deno KV which, if run as-is, will expose the entire knowledge-graph to anyone who connects
  • The current main branch (0.3.0) has no CORS or rate-limiting

Thanks for your consideration - I'll consider adding it when I publish 0.4.0 this week.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants