[risky-server] Secret/token in environment: API_SECRET has hardcoded value
network_trust (100%)
No network exposure or suspicious URL issues
LLM Security Review
CRITICAL
The risky-server pipes a remote shell script directly into bash, granting full arbitrary code execution from an untrusted URL.
Fix: Remove this server and replace with a vetted, pinned MCP package installed locally.
A live-looking API secret is hardcoded in plaintext inside the env block.
Fix: Rotate the key immediately and load it from a secret manager or environment variable reference.
HIGH
The filesystem server is granted access to the entire ~/projects directory, exposing all project source and any embedded secrets.
Fix: Scope the filesystem server to the specific subdirectory required for the current task.
MEDIUM
npx -y auto-installs the latest unpinned package version, enabling silent supply-chain swaps.
Fix: Pin to a specific version (e.g., @modelcontextprotocol/server-filesystem@x.y.z) or install locally.
The remote install script is fetched over a non-integrity-checked URL with no checksum verification.
Fix: Avoid curl-to-bash; download, inspect, and verify a pinned hash before execution.