Skip to content

Conversation

lwsinclair
Copy link

Hi there,

This pull request shares a security update on make-mcp-server.

We also have an entry for make-mcp-server in our directory, MseeP.ai, where we provide regular security and trust updates on your app.

We invite you to add our badge for your MCP server to your README to help your users learn from a third party that provides ongoing validation of make-mcp-server.

You can easily take control over your listing for free: visit it at https://mseep.ai/app/integromat-make-mcp-server.

Yours Sincerely,

Lawrence W. Sinclair
CEO/SkyDeck AI
Founder of MseeP.ai
MCP servers you can trust


MseeP.ai Security Assessment Badge

Here are our latest evaluation results of make-mcp-server

Security Scan Results

Security Score: 100/100

Risk Level: low

Scan Date: 2025-06-13

Score starts at 100, deducts points for security issues, and adds points for security best practices

Detected Vulnerabilities

Medium Severity

  • @babel/helpers

    • [{'source': 1104001, 'name': '@babel/helpers', 'dependency': '@babel/helpers', 'title': 'Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups', 'url': 'https://github.com/advisories/GHSA-968p-4wvh-cqc8', 'severity': 'moderate', 'cwe': ['CWE-1333'], 'cvss': {'score': 6.2, 'vectorString': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}, 'range': '<7.26.10'}]
    • Fixed in version: unknown
  • brace-expansion

    • [{'source': 1105443, 'name': 'brace-expansion', 'dependency': 'brace-expansion', 'title': 'brace-expansion Regular Expression Denial of Service vulnerability', 'url': 'https://github.com/advisories/GHSA-v6h2-p8h4-qcjw', 'severity': 'low', 'cwe': ['CWE-400'], 'cvss': {'score': 3.1, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}, 'range': '>=1.0.0 <=1.1.11'}, {'source': 1105444, 'name': 'brace-expansion', 'dependency': 'brace-expansion', 'title': 'brace-expansion Regular Expression Denial of Service vulnerability', 'url': 'https://github.com/advisories/GHSA-v6h2-p8h4-qcjw', 'severity': 'low', 'cwe': ['CWE-400'], 'cvss': {'score': 3.1, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}, 'range': '>=2.0.0 <=2.0.1'}]
    • Fixed in version: unknown

This security assessment was conducted by MseeP.ai, an independent security validation service for MCP servers. Visit our website to learn more about our security reviews.

@Copilot Copilot AI review requested due to automatic review settings July 17, 2025 07:37
@lwsinclair lwsinclair requested a review from a team as a code owner July 17, 2025 07:37
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR adds a MseeP.ai security assessment badge to the top of the README to surface ongoing third-party validation for make-mcp-server.

  • Inserts a badge markdown link above the existing title
  • Adds an extra blank line for separation
Comments suppressed due to low confidence (1)

README.md:1

  • [nitpick] Consider adding a brief heading or sentence beneath the badge to explain what the MseeP.ai assessment covers and why it’s beneficial for users, so readers have clear context.
[![MseeP.ai Security Assessment Badge](https://mseep.net/pr/integromat-make-mcp-server-badge.png)](https://mseep.ai/app/integromat-make-mcp-server)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant