Skip to content

Add MseeP.ai badge#5660

Open
mseep-ai wants to merge 1 commit intoSchemaStore:masterfrom
mseep-ai:add-mseep-badge
Open

Add MseeP.ai badge#5660
mseep-ai wants to merge 1 commit intoSchemaStore:masterfrom
mseep-ai:add-mseep-badge

Conversation

@mseep-ai
Copy link
Copy Markdown

@mseep-ai mseep-ai commented May 7, 2026

Hi there,

This pull request shares a security update on schemastore.

We also have an entry for schemastore in our directory, MseeP.ai, where we provide regular security and trust updates on your app.

We invite you to add our badge for your MCP server to your README to help your users learn from a third party that provides ongoing validation of schemastore.

You can easily take control over your listing for free: visit it at https://mseep.ai/app/schemastore-schemastore.

Thanks,

The MseeP Team
MCP servers you can trust


MseeP.ai Security Assessment Badge

Here are our latest evaluation results of schemastore

Security Scan Results

Security Score: 91/100

Risk Level: low

Scan Date: 2026-05-07

Score starts at 100, deducts points for security issues, and adds points for security best practices

Detected Vulnerabilities

Medium Severity

  • @prantlf/jsonlint

    • ['ajv', 'diff']
    • Fixed in version: unknown
  • ajv

    • [{'source': 1113715, 'name': 'ajv', 'dependency': 'ajv', 'title': 'ajv has ReDoS when using $data option', 'url': 'https://github.com/advisories/GHSA-2g4f-4pwh-qvx6', 'severity': 'moderate', 'cwe': ['CWE-400', 'CWE-1333'], 'cvss': {'score': 0, 'vectorString': None}, 'range': '>=7.0.0-alpha.0 <8.18.0'}]
    • Fixed in version: unknown
  • diff

    • [{'source': 1112706, 'name': 'diff', 'dependency': 'diff', 'title': 'jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch', 'url': 'https://github.com/advisories/GHSA-73rr-hh4g-fpgx', 'severity': 'low', 'cwe': ['CWE-400', 'CWE-1333'], 'cvss': {'score': 0, 'vectorString': None}, 'range': '>=6.0.0 <8.0.3'}]
    • Fixed in version: unknown

Security Findings

Medium Severity Issues

  • semgrep: Use of eval() detected. This can be dangerous if used with untrusted input.
    • Location: cli.js
    • Line: 2273

This security assessment was conducted by MseeP.ai, an independent security validation service for MCP servers. Visit our website to learn more about our security reviews.

@github-actions github-actions Bot added the Documentation "**/*.md" folder is updated (auto-generated by labeler action) label May 7, 2026
@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented May 7, 2026

Thanks for the PR!

This section of the codebase is owned by @madskristensen and @hyperupcall - if they write a comment saying "LGTM" then it will be merged.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Documentation "**/*.md" folder is updated (auto-generated by labeler action)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant