ICUICU
critical

@vendure/mcp-server

v1.0.4-alpha

The official Vendure MCP server

npmhousein_is_programmingFirst seen Feb 22, 2026

12

Total

6

Critical

2

High

4

Medium

Findings

unknown
criticalDE-002Data ExfiltrationHigh ConfidenceLine 0

Environment file access

Detected by automated pattern matching (rule DE-002) with medium confidence. May be a false positive.

    18:         return 'Vendure config file not found.';
    19:     }
>>> 20:     const dbTypeRegex = /type:\s*(?:['"]([^'"]+)['"]|(?:process\.env\.([a-zA-Z0-9_]+)))/;
    21:     const dbTypeMatch = configContent.match(dbTypeRegex);
    22:     if (!dbTypeMatch) {
Report false positive
criticalDE-002Data ExfiltrationHigh ConfidenceLine 0

Environment file access

Detected by automated pattern matching (rule DE-002) with medium confidence. May be a false positive.

    29:     else if (dbTypeMatch[2]) {
    30:         const envVarName = dbTypeMatch[2];
>>> 31:         const envPath = path.join(projectPath, '.env');
    32:         if (!fs.existsSync(envPath)) {
    33:             return `Database type is set by environment variable "${envVarName}", but .env file was not found.`;
Report false positive
criticalDE-002Data ExfiltrationHigh ConfidenceLine 0

Environment file access

Detected by automated pattern matching (rule DE-002) with medium confidence. May be a false positive.

    31:         const envPath = path.join(projectPath, '.env');
    32:         if (!fs.existsSync(envPath)) {
>>> 33:             return `Database type is set by environment variable "${envVarName}", but .env file was not found.`;
    34:         }
    35:         const envContent = fs.readFileSync(envPath);
Report false positive
criticalDE-002Data ExfiltrationHigh ConfidenceLine 0

Environment file access

Detected by automated pattern matching (rule DE-002) with medium confidence. May be a false positive.

    37:         dbType = envVars[envVarName];
    38:         if (!dbType) {
>>> 39:             return `Database type is set by environment variable "${envVarName}", but it was not found in the .env file.`;
    40:         }
    41:     }
Report false positive
criticalDE-002Data ExfiltrationHigh ConfidenceLine 0

Environment file access

Detected by automated pattern matching (rule DE-002) with medium confidence. May be a false positive.

    42:     if (dbType) {
    43:         if (SUPPORTED_DB_TYPES.includes(dbType)) {
>>> 44:             const source = dbTypeMatch[1] ? 'config file' : '.env file';
    45:             return `Database type: ${dbType} (from ${source})`;
    46:         }
Report false positive
criticalDE-002Data ExfiltrationHigh ConfidenceLine 0

Environment file access

Detected by automated pattern matching (rule DE-002) with medium confidence. May be a false positive.

    18:             cwd: projectPath,
    19:             stdio: ['pipe', 'pipe', 'pipe'],
>>> 20:             env: Object.assign({}, process.env),
    21:         });
    22:         let stdout = '';
Report false positive
highSC-005Suspicious CommandsMedium ConfidenceLine 0

Node.js child process spawning

Detected by automated pattern matching (rule SC-005) with medium confidence. May be a false positive.

>>> 1: import { spawn } from 'child_process';
    2: import fs from 'fs';
    3: import path from 'path';
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ���y��zw���v��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
mediumNS-003Network SuspiciousMedium ConfidenceLine 0

JavaScript fetch() call

Detected by automated pattern matching (rule NS-003) with medium confidence. May be a false positive.

    65:     async fetchFromWeb(filename) {
    66:         const url = `${VendureDocsService.VENDURE_DOCS_BASE_URL}/${filename}`;
>>> 67:         // Use Node.js built-in fetch (available in Node.js 18+)
    68:         const response = await fetch(url);
    69:         if (!response.ok) {
Report false positive
mediumNS-003Network SuspiciousMedium ConfidenceLine 0

JavaScript fetch() call

Detected by automated pattern matching (rule NS-003) with medium confidence. May be a false positive.

    66:         const url = `${VendureDocsService.VENDURE_DOCS_BASE_URL}/${filename}`;
    67:         // Use Node.js built-in fetch (available in Node.js 18+)
>>> 68:         const response = await fetch(url);
    69:         if (!response.ok) {
    70:             throw new Error(`HTTP ${response.status}: ${response.statusText}`);
Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.9 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.9 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive

Scan History

DateRiskFindings
Feb 27, 2026critical12
Feb 25, 2026critical12
Feb 23, 2026critical12
Feb 22, 2026critical12