This project tracks known vulnerabilities within Model Context Protocol (MCP) servers. The website is designed to be easily updated by modifying a markdown file instead of directly editing HTML.
- Edit the
vulnerabilities.mdfile to add, modify, or remove vulnerability information - Run
npm run updateto regenerate the website (now uses stable UI-preserving script) - The
index.htmlfile will be automatically updated with your changes while preserving the stable design
📖 For detailed instructions, see UPDATE-GUIDE.md
Each vulnerability in the vulnerabilities.md file should follow this format:
## Vulnerability Title
**Severity:** High/Medium/Low
**Category:** Security/Limitations/Implementation
**Reported By:** Organization or Person Name
**Date:** Month Day, Year
**Tags:** Tag1, Tag2, Tag3
**URL:** https://example.com/vulnerability-details
Description of the vulnerability goes here. This can be multiple paragraphs.
---The separator --- is used to indicate the end of a vulnerability entry.
# Install dependencies
npm install
# Update the website
npm run update