Exa Search
Official MCPAI-native search engine providing real-time web information through Exa's Search API
Quick Install
smcp run official/exa-search@commit-reinges-2026-03-01
Run securely with mcp hub client The secure MCP runner by mcp-hub
Integrity Verified
Level 0Basic integrity checks passed. Digest validation and schema validation completed.
MSSS: Level 0 (Not Compliant)
Not Recommended for Production
Critical security issues found. This MCP server should not be used in production until remediated.
Vulnerability Summary
20 total findings detected
Score Breakdown
OWASP MCP Top 10 View full details →
MSSS Certification Level
MCP Server Security Standard (MSSS) — A standardized framework for evaluating MCP server security. Learn more
Security Controls
Other Controls
No Secrets in Code
Control failed: 3 findings found, score 70.0
No Prompt Injection
Control failed: 8 findings found, score 50.0
No Tool Poisoning
Control failed: 9 findings found, score 50.0
Security Findings
| Severity | CVSS | Finding | Class | Location | CWE |
|---|---|---|---|---|---|
| high | — |
User input flows to LLM prompt without validation User input flows to LLM prompt without validation |
H Prompt Injection | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/webSearchAdvanced.ts:204 | — |
DescriptionUser input flows to LLM prompt without validation Code Snippet
RemediationValidate and sanitize user input before passing to LLM APIs |
|||||
| high | — |
ML classifier detected prompt injection pattern ML classifier detected prompt injection pattern |
G Tool Poisoning | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/api/mcp.ts:140 | — |
DescriptionML classifier detected prompt injection pattern Code Snippet
RemediationReview and sanitize the detected text for potential injection attempts |
|||||
| high | — |
User input flows to LLM prompt without validation User input flows to LLM prompt without validation |
H Prompt Injection | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/webSearch.ts:94 | — |
DescriptionUser input flows to LLM prompt without validation Code Snippet
RemediationValidate and sanitize user input before passing to LLM APIs |
|||||
| high | — |
ML classifier detected prompt injection pattern ML classifier detected prompt injection pattern |
G Tool Poisoning | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/webSearchAdvanced.ts:12 | — |
DescriptionML classifier detected prompt injection pattern Code Snippet
RemediationReview and sanitize the detected text for potential injection attempts |
|||||
| high | — |
ML classifier detected prompt injection pattern ML classifier detected prompt injection pattern |
G Tool Poisoning | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/webSearchAdvanced.ts:13 | — |
DescriptionML classifier detected prompt injection pattern Code Snippet
RemediationReview and sanitize the detected text for potential injection attempts |
|||||
| high | — |
ML classifier detected prompt injection pattern ML classifier detected prompt injection pattern |
G Tool Poisoning | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/companyResearch.ts:12 | — |
DescriptionML classifier detected prompt injection pattern Code Snippet
RemediationReview and sanitize the detected text for potential injection attempts |
|||||
| high | — |
User input flows to LLM prompt without validation User input flows to LLM prompt without validation |
H Prompt Injection | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/companyResearch.ts:90 | — |
DescriptionUser input flows to LLM prompt without validation Code Snippet
RemediationValidate and sanitize user input before passing to LLM APIs |
|||||
| high | — |
ML classifier detected prompt injection pattern ML classifier detected prompt injection pattern |
G Tool Poisoning | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/crawling.ts:12 | — |
DescriptionML classifier detected prompt injection pattern Code Snippet
RemediationReview and sanitize the detected text for potential injection attempts |
|||||
| high | — |
User input flows to LLM prompt without validation User input flows to LLM prompt without validation |
H Prompt Injection | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/crawling.ts:87 | — |
DescriptionUser input flows to LLM prompt without validation Code Snippet
RemediationValidate and sanitize user input before passing to LLM APIs |
|||||
| high | — |
User input flows to LLM prompt without validation User input flows to LLM prompt without validation |
H Prompt Injection | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/deepResearchCheck.ts:138 | — |
DescriptionUser input flows to LLM prompt without validation Code Snippet
RemediationValidate and sanitize user input before passing to LLM APIs |
|||||
| high | — |
User input flows to LLM prompt without validation User input flows to LLM prompt without validation |
H Prompt Injection | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/deepResearchStart.ts:94 | — |
DescriptionUser input flows to LLM prompt without validation Code Snippet
RemediationValidate and sanitize user input before passing to LLM APIs |
|||||
| high | — |
ML classifier detected prompt injection pattern ML classifier detected prompt injection pattern |
G Tool Poisoning | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/exaCode.ts:12 | — |
DescriptionML classifier detected prompt injection pattern Code Snippet
RemediationReview and sanitize the detected text for potential injection attempts |
|||||
| high | — |
User input flows to LLM prompt without validation User input flows to LLM prompt without validation |
H Prompt Injection | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/exaCode.ts:88 | — |
DescriptionUser input flows to LLM prompt without validation Code Snippet
RemediationValidate and sanitize user input before passing to LLM APIs |
|||||
| high | — |
ML classifier detected prompt injection pattern ML classifier detected prompt injection pattern |
G Tool Poisoning | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/linkedInSearch.ts:12 | — |
DescriptionML classifier detected prompt injection pattern Code Snippet
RemediationReview and sanitize the detected text for potential injection attempts |
|||||
| high | — |
Tool description contains suspicious Unicode characters Tool description contains suspicious Unicode characters |
G Tool Poisoning | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/linkedInSearch.ts:83 | — |
DescriptionTool description contains suspicious Unicode characters Code Snippet
RemediationRemove Unicode control characters and confusables |
|||||
| high | — |
User input flows to LLM prompt without validation User input flows to LLM prompt without validation |
H Prompt Injection | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/peopleSearch.ts:93 | — |
DescriptionUser input flows to LLM prompt without validation Code Snippet
RemediationValidate and sanitize user input before passing to LLM APIs |
|||||
| high | — |
ML classifier detected prompt injection pattern ML classifier detected prompt injection pattern |
G Tool Poisoning | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/src/tools/webSearch.ts:13 | — |
DescriptionML classifier detected prompt injection pattern Code Snippet
RemediationReview and sanitize the detected text for potential injection attempts |
|||||
| medium | — |
Potential secret in variable name Potential secret in variable name |
E Secrets/Tokens | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/api/mcp.ts:230 | — |
DescriptionPotential secret in variable name Code Snippet
RemediationAvoid storing secrets in plaintext variables |
|||||
| medium | — |
Potential secret in variable name Potential secret in variable name |
E Secrets/Tokens | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/api/mcp.ts:313 | — |
DescriptionPotential secret in variable name Code Snippet
RemediationAvoid storing secrets in plaintext variables |
|||||
| medium | — |
Potential secret in variable name Potential secret in variable name |
E Secrets/Tokens | /tmp/mcp-scan-worker-2534411951/source/4ff0db4151d3-d0388ea7/api/mcp.ts:37 | — |
DescriptionPotential secret in variable name Code Snippet
RemediationAvoid storing secrets in plaintext variables |
|||||
No findings match the selected filter
MCP Surface Analysis
Attack Surface Analysis
Declared capabilities, transport security, and authentication posture
Tools
0
Resources
0
Transport
Not detected
Auth
Not detected
Detected Capabilities
Inferred system access requirements from static analysis
Declared Tools
0 totalNo tools declared
This server does not expose any callable tools
Resources
0 totalNo resources detected
This server does not expose any data resources
Transport Security
Insecure- Type
- Not detected
- Protocol
- Not detected
- TLS / Encryption
- Not Enabled
Authentication & Secrets
- Authentication
- Not Detected
- Token in Environment
- No
- Secrets Detected
- None Detected
No authentication mechanism detected. This server may accept unauthenticated connections.
OWASP MCP Top 10 (2025)
Risk assessment mapped to OWASP MCP security framework v0.1
| Risk ID | Risk Name | Status | Related Controls | Findings |
|---|---|---|---|---|
| MCP01 |
Token Mismanagement & Secret Exposure
Hard-coded credentials, long-lived tokens, secrets in logs
|
At Risk | 2/3 controls pass | 3 |
| MCP02 |
Privilege Escalation via Scope Creep
Weak scope enforcement, expanding permissions
|
Mitigated | 1/1 controls pass | 0 |
| MCP03 |
Tool Poisoning
Rug pulls, schema poisoning, tool shadowing
|
Vulnerable | 1/2 controls pass | 9 |
| MCP04 |
Software Supply Chain Attacks
Dependency tampering, build pipeline attacks
|
Mitigated | 3/3 controls pass | 0 |
| MCP05 |
Command Injection & Execution
Shell injection, chained execution, tool-mediated injection
|
Mitigated | 2/2 controls pass | 0 |
| MCP06 |
Prompt Injection via Contextual Payloads
Hidden instructions in input, files, or retrieved documents
|
Vulnerable | 3/4 controls pass | 8 |
| MCP07 |
Insufficient Authentication & Authorization
Missing auth, shared secrets, token replay, impersonation
|
Not Assessed | No mapped controls | 0 |
| MCP08 |
Lack of Audit and Telemetry
Insufficient logging, no traceability for autonomous workflows
|
Mitigated | 1/1 controls pass | 0 |
| MCP09 |
Shadow MCP Servers
Unauthorized instances outside security governance
|
Not Assessed | No mapped controls | 0 |
| MCP10 |
Context Injection & Over-Sharing
Context window leaks, data exposure across sessions
|
Mitigated | 2/2 controls pass | 0 |
Based on OWASP MCP Top 10 v0.1 (2025). Controls and findings are mapped by category and keyword analysis.
20 total findings analyzed
Compliance Matrix
Level 0: Integrity Verified
Cert Level 0Basic digest and schema validation only. No static analysis passed.
MSSS — MCP Server Security Standard
Certification level progression and control requirements · Score: 14/100 (Not Compliant)
Level 1 -- Static Verified
23/26Basic analysis, score ≥ 60, no critical findings
88%
- No Critical Vulnerabilities
- No High Vulnerabilities
- No Secrets in Code
- No SQL Injection
- No Command Injection
- No Path Traversal
- No Insecure Deserialization
- No XSS Vulnerabilities
- Secure Cryptography
- No Hardcoded Credentials
- Compatible License
- No Copyleft License
- No Deprecated Dependencies
- Pinned Dependencies
- Known Supply Chain
- Code Quality
- Error Handling
- Input Validation
- Logging
- No Prompt Injection
- No Tool Poisoning
- No Remote Code Execution
- No SSRF or Data Exfiltration
- No Privilege Escalation
- No Cross-Tool Data Leakage
- No Hidden Network Channels
Level 2 -- Security Certified
0/0Full analysis, score ≥ 80, SBOM evidence required
0%
Level 3 -- Runtime Certified
0/0Score ≥ 90, dynamic analysis, full attestation chain
0%
MSSS Controls Detail
Individual control results grouped by security category
| Control | Status | Severity | Evidence |
|---|---|---|---|
No Critical Vulnerabilities SEC-001 |
PASS | Control passed: No significant issues found | |
No High Vulnerabilities SEC-002 |
PASS | Control passed: No significant issues found | |
No Secrets in Code SEC-003 |
FAIL | MEDIUM | Control failed: 3 findings found, score 70.0 |
No SQL Injection SEC-004 |
PASS | Control passed: No significant issues found | |
No Command Injection SEC-005 |
PASS | Control passed: No significant issues found | |
No Path Traversal SEC-006 |
PASS | Control passed: No significant issues found | |
No Insecure Deserialization SEC-007 |
PASS | Control passed: No significant issues found | |
No XSS Vulnerabilities SEC-008 |
PASS | Control passed: No significant issues found | |
Secure Cryptography SEC-009 |
PASS | Control passed: No significant issues found | |
No Hardcoded Credentials SEC-010 |
PASS | Control passed: No significant issues found | |
Compatible License SC-001 |
PASS | Control passed: No significant issues found | |
No Copyleft License SC-002 |
PASS | Control passed: No significant issues found | |
No Deprecated Dependencies SC-003 |
PASS | Control passed: No significant issues found | |
Pinned Dependencies SC-004 |
PASS | Control passed: No significant issues found | |
Known Supply Chain SC-005 |
PASS | Control passed: No significant issues found | |
Code Quality MAT-001 |
PASS | Control passed: No significant issues found | |
Error Handling MAT-002 |
PASS | Control passed: No significant issues found | |
Input Validation MAT-003 |
PASS | Control passed: No significant issues found | |
Logging MAT-004 |
PASS | Control passed: No significant issues found | |
No Prompt Injection SEC-011 |
FAIL | HIGH | Control failed: 8 findings found, score 50.0 |
No Tool Poisoning SEC-012 |
FAIL | HIGH | Control failed: 9 findings found, score 50.0 |
No Remote Code Execution SEC-013 |
PASS | Control passed: No significant issues found | |
No SSRF or Data Exfiltration SEC-014 |
PASS | Control passed: No significant issues found | |
No Privilege Escalation SEC-015 |
PASS | Control passed: No significant issues found | |
No Cross-Tool Data Leakage SEC-016 |
PASS | Control passed: No significant issues found | |
No Hidden Network Channels SEC-017 |
PASS | Control passed: No significant issues found |