MCP Server Certified

mark3labs-filesystem-server

Provides secure sandboxed access to local filesystem operations including reading, writing, copying, moving, deleting files and directories with configurable allowed directories.

67

/ 100 · Grade D

D = 60–69

I need to safely perform file and directory operations on the local filesystem with security constraints that prevent access outside of designated allowed directories.

filesystemfile managementsecuritymcp serversandboxed operations
Publisher: unknownVersion: latestCertified: Mar 28, 2026Expires: Mar 28, 2027Source ↗

mark3labs-filesystem-server earned Certified status with a trust score of 67/100 (Grade D). Adversarial testing produced 662 findings (662 medium). Supply chain contains 32 components with 2 known vulnerabilities. Security scan: clean.


Trust Score Breakdown

Eight weighted signals composing the aggregate trust score

security scan
100% × 15w
15.0
supply chain
96% × 10w
9.6
adversarial
85% × 25w
21.3
provenance
50% × 20w
10.0
consumer confirm
50% × 10w
5.0
behavioral pass
50% × 10w
5.0
contract accuracy
46% × 6w
2.8
uptime
100% × 4w
4.0

Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.


Findings

Security scan results, adversarial testing, and pipeline review

Security Scan — Cisco MCP Scanner

cisco-mcp-scannerSAFE
yarallmreadiness
critical: 0high: 0medium: 0low: 0
Live scan: completed · 0 findings · 12413ms
Code scan: completed · 0 findings · 5857ms

Adversarial Testing — 5 categories, 662 findings

prompt injection chainsprivilege escalationdata exfiltration side channelscapability squattingdependency confusion
mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Direct instruction override" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "System prompt injection attempt" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Nested instruction in data field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "XML-style injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Instruction disguised as comment" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Instruction in name/label field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Instruction in description field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Instruction in tag/category field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "copy_file" responded to adversarial input "Null byte injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "create_directory" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "delete_file" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "get_file_info" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_directory" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "modify_file" responded to adversarial input "Null byte injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "move_file" responded to adversarial input "Null byte injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "search_files" responded to adversarial input "Null byte injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "search_within_files" responded to adversarial input "Null byte injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "tree" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Oversized input to trigger error" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "write_file" responded to adversarial input "Null byte injection" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Unicode edge cases" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "copy_file" responded to adversarial input "Null byte truncation" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "copy_file" responded to adversarial input "Absolute path escape" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "copy_file" responded to adversarial input "Symlink-style path" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "copy_file" responded to adversarial input "Prefix bypass (partial match escape)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "create_directory" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "create_directory" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "create_directory" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "create_directory" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "create_directory" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "create_directory" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "delete_file" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "delete_file" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "delete_file" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "delete_file" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "delete_file" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "delete_file" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "get_file_info" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "get_file_info" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "get_file_info" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "get_file_info" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "get_file_info" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "get_file_info" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "list_directory" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "list_directory" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "list_directory" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "list_directory" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "list_directory" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "list_directory" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "modify_file" responded to adversarial input "Null byte truncation" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "modify_file" responded to adversarial input "Absolute path escape" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "modify_file" responded to adversarial input "Symlink-style path" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "modify_file" responded to adversarial input "Prefix bypass (partial match escape)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "move_file" responded to adversarial input "Null byte truncation" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "move_file" responded to adversarial input "Absolute path escape" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "move_file" responded to adversarial input "Symlink-style path" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "move_file" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "move_file" responded to adversarial input "Prefix bypass (partial match escape)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "read_file" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "read_file" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "read_file" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "read_file" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "read_file" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "read_file" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_files" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "search_files" responded to adversarial input "Null byte truncation" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "search_files" responded to adversarial input "Absolute path escape" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "search_files" responded to adversarial input "Symlink-style path" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "search_files" responded to adversarial input "Prefix bypass (partial match escape)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "search_within_files" responded to adversarial input "Null byte truncation" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "search_within_files" responded to adversarial input "Absolute path escape" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "search_within_files" responded to adversarial input "Symlink-style path" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "search_within_files" responded to adversarial input "Prefix bypass (partial match escape)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "tree" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "tree" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "tree" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "tree" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "tree" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "tree" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Basic relative traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Double-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Backslash traversal (Windows)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "write_file" responded to adversarial input "Null byte truncation" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "write_file" responded to adversarial input "Absolute path escape" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "write_file" responded to adversarial input "Symlink-style path" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "write_file" responded to adversarial input "URL-encoded traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Mixed separator traversal" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "write_file" responded to adversarial input "Prefix bypass (partial match escape)" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Trailing dot bypass" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "copy_file" responded to adversarial input "Non-existent resource path" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "create_directory" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "create_directory" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "create_directory" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "create_directory" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "create_directory" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "delete_file" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "delete_file" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "delete_file" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "delete_file" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "delete_file" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "get_file_info" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "get_file_info" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "get_file_info" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "get_file_info" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "get_file_info" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "list_directory" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "list_directory" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "list_directory" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "list_directory" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "list_directory" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "modify_file" responded to adversarial input "Non-existent resource path" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "move_file" responded to adversarial input "Non-existent resource path" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "read_file" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "read_file" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "read_file" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "read_file" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "read_file" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "search_files" responded to adversarial input "Non-existent resource path" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "search_within_files" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "search_within_files" responded to adversarial input "Non-existent resource path" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "tree" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "tree" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "tree" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "tree" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "tree" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Empty/missing required argument" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Wrong type (string where number expected)" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Extremely large input" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "SQL-injection-style to trigger DB errors" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "write_file" responded to adversarial input "Non-existent resource path" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Unicode edge case" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "copy_file" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "create_directory" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "create_directory" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "create_directory" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "create_directory" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "create_directory" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "create_directory" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "create_directory" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "create_directory" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "create_directory" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "delete_file" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "delete_file" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "delete_file" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "delete_file" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "delete_file" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "delete_file" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "delete_file" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "delete_file" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "delete_file" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "get_file_info" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "get_file_info" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "get_file_info" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "get_file_info" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "get_file_info" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "get_file_info" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "get_file_info" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "get_file_info" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "get_file_info" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "list_directory" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "list_directory" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "list_directory" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "list_directory" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "list_directory" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "list_directory" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "list_directory" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "list_directory" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "list_directory" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed3 occurrences

Tool "modify_file" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "move_file" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "move_file" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "read_file" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "read_file" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "read_file" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "read_file" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "read_file" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "read_file" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "read_file" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "read_file" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "read_file" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_files" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_files" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed4 occurrences

Tool "search_within_files" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed4 occurrences

Tool "search_within_files" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed4 occurrences

Tool "search_within_files" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed4 occurrences

Tool "search_within_files" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "search_within_files" responded to adversarial input "Zero value" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Max 32-bit int" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Hacker culture value" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "search_within_files" responded to adversarial input "Max safe JS integer" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed4 occurrences

Tool "search_within_files" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed4 occurrences

Tool "search_within_files" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed4 occurrences

Tool "search_within_files" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed4 occurrences

Tool "search_within_files" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed4 occurrences

Tool "search_within_files" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "tree" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "tree" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "tree" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "tree" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "tree" responded to adversarial input "Zero value" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "tree" responded to adversarial input "Negative one" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "tree" responded to adversarial input "Max 32-bit int" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "tree" responded to adversarial input "Hacker culture value" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed

Tool "tree" responded to adversarial input "Max safe JS integer" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "tree" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "tree" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "tree" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "tree" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "tree" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Debug flag string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Admin string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Test string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Backdoor classic" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Root user reference" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Wildcard/glob" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "write_file" responded to adversarial input "True string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Null string" with content containing sensitive data patterns: windows_path.

mediumReviewcapability squattingconfirmed2 occurrences

Tool "write_file" responded to adversarial input "Undefined string" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "write_file" responded to adversarial input "Step 1 of path traversal chain: Create a seemingly benign config file containing a path traversal payload in the log_path field" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "read_file" responded to adversarial input "Step 2 of path traversal chain: Read the config file to extract the malicious path, which could then be used in subsequent file operations" with content containing sensitive data patterns: windows_path.

mediumReviewprompt injection chainsconfirmed

Tool "list_allowed_directories" responded to adversarial input "Test if list_allowed_directories response contains instruction injection patterns like role assignments, system prompts, or context boundary markers that could hijack the calling agent" with content containing sensitive data patterns: windows_path.

mediumReviewprivilege escalationconfirmed

Tool "list_directory" responded to adversarial input "Step 1: Attempt to list a system directory outside allowed scope to obtain sensitive file paths that could be used in subsequent operations" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "list_allowed_directories" responded to adversarial input "Trigger directory listing to capture any debug output, internal paths, or configuration details leaked to stdout/stderr" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "read_file" responded to adversarial input "Attempt to read AWS credentials file from user home directory to detect AWS access keys and secret keys" with content containing sensitive data patterns: windows_path.

mediumReviewdata exfiltration side channelsconfirmed

Tool "search_files" responded to adversarial input "Search for environment files that commonly contain API keys, database passwords, and other secrets" with content containing sensitive data patterns: windows_path.

mediumReviewdependency confusionconfirmed

Tool "search_files" responded to adversarial input "Search for Node.js lockfile (package-lock.json) in the project root to verify its presence" with content containing sensitive data patterns: windows_path.

mediumReviewdependency confusionconfirmed

Tool "search_files" responded to adversarial input "Search for Yarn lockfile (yarn.lock) to check for alternative package manager lockfiles" with content containing sensitive data patterns: windows_path.

mediumReviewdependency confusionconfirmed

Tool "read_multiple_files" responded to adversarial input "Read package manifest, lockfiles, and gitignore to analyze dependency pinning and check if lockfiles are excluded from version control" with content containing sensitive data patterns: windows_path.

mediumReviewdependency confusionconfirmed

Tool "search_files" responded to adversarial input "Search for repository hook configuration files that could execute code on clone/open (e.g., .claude/hooks.json, .git/hooks/*, .vscode/tasks.json)" with content containing sensitive data patterns: windows_path.

mediumReviewdependency confusionconfirmed

Tool "read_file" responded to adversarial input "Attempt to read a malicious Claude hooks configuration file that could execute arbitrary commands when the repository is opened in Claude Code" with content containing sensitive data patterns: windows_path.

Methodology v1.0 · 5 categories · ~55 attack patterns


OWASP MCP Top 10 Coverage

Evaluation activity mapped to the OWASP MCP Top 10 risk framework

MCP01 covered

Excessive Agency & Permissions

Cisco scanner behavioral analysis of permission scope

MCP02 covered

Unauthorized Data Access

Category 3 (data exfiltration) attack patterns

MCP03 covered

Tool Poisoning

Category 1 (prompt injection) and Category 5 (context poisoning) attack patterns

MCP04 covered

Supply Chain Vulnerabilities

SBOM generation (syft/cdxgen) and vulnerability scanning (grype/osv-scanner/npm audit)

MCP05 covered

Command Injection

Category 2 (privilege escalation) and Category 6 (repo config injection) attack patterns

MCP06 covered

Intent Subversion

Category 1 (prompt injection) and Category 4 (capability squatting) attack patterns

MCP07 covered

Insecure Data Handling

Cisco scanner data flow and sensitive data handling analysis

MCP08 gap

Insufficient Logging

Not directly tested — logging adequacy requires runtime observation beyond current pipeline scope

MCP09 covered

Resource Exhaustion

Resource profiling (CPU, memory) during functional and adversarial testing

MCP10 covered

Context Injection

Category 5 (context poisoning) attack patterns

OWASP MCP Top 10 (Beta) — owasp.org/www-project-mcp-top-10


Supply Chain

SBOM analysis and vulnerability assessment

Components

32

Direct deps

9

Transitive deps

23

Total vulns

2

Vulnerability breakdown

critical: 0high: 0medium: 0low: 2

Format: CycloneDX 1.5 · Generated: Mar 28, 2026


Behavioral Fingerprint

Runtime performance baseline for drift detection

Samples

953

Error rate

19.2%

Peak memory

50.5 MB

Avg CPU

0.01%

Response time distribution

p50: 1msp95: 1msp99: 2ms

Output size distribution

p50: 195 Bp95: 277 Bmean: 209 B

Per-tool performance

Toolp50p95Error rateSamples
tree1ms1ms13.6%70
copy_file1ms1ms19.3%88
move_file1ms1ms19.4%87
read_file1ms1ms16.7%55
write_file1ms1ms20.2%87
delete_file1ms1ms18.0%50
modify_file1ms1ms19.3%134
search_files1ms1ms17.6%98
get_file_info1ms1ms19.0%47
list_directory1ms1ms19.0%47
create_directory1ms1ms19.3%46
read_multiple_files1ms1ms58.3%10
search_within_files1ms1ms18.7%126
list_allowed_directories1ms1ms0.0%8

Fingerprint v1.0 · Baseline: Mar 28, 2026 · Status: baseline


Interface

Enumerated tools, resources, and prompts

Tools (14)

copy_file

Copy files and directories.

create_directory

Create a new directory or ensure a directory exists.

delete_file

Delete a file or directory from the file system.

get_file_info

Retrieve detailed metadata about a file or directory.

list_allowed_directories

Returns the list of directories that this server is allowed to access.

list_directory

Get a detailed listing of all files and directories in a specified path.

modify_file

Update file by finding and replacing text. Provides a simple pattern matching interface without needing exact character positions.

move_file

Move or rename files and directories.

read_file

Read the complete contents of a file from the file system.

read_multiple_files

Read the contents of multiple files in a single operation.

search_files

Recursively search for files and directories matching a pattern.

search_within_files

Search for text within file contents. Unlike search_files which only searches file names, this tool scans the actual contents of text files for matching substrings. Binary files are automatically excluded from the search. Reports file paths and line numbers where matches are found.

tree

Returns a hierarchical JSON representation of a directory structure.

write_file

Create a new file or overwrite an existing file with new content.

Resources (1)

File System

file://

Transport: stdio


Scope & Permissions

What this capability can and cannot access — derived from pipeline analysis

creates files

yes

deletes files

yes

modifies files

yes

accesses env variables

no

invokes external tools

no

makes network requests

no

Side effects

May modify files on disk

May create new files or directories

May delete files or directories


Behavioral Guarantees

Claims extracted from publisher documentation — each tagged with provenance

Provides secure access to the local filesystem via the Model Context Protocol (MCP)

author

Read the complete contents of a file from the file system

author

Read the contents of multiple files in a single operation

author

Create a new file or overwrite an existing file with new content

author

Copy files and directories

author

Move or rename files and directories

author

Delete a file or directory from the file system

author

Update file by finding and replacing text using string matching or regex

author

Get a detailed listing of all files and directories in a specified path

author

Create a new directory or ensure a directory exists

author

Returns a hierarchical JSON representation of a directory structure

author

Recursively search for files and directories matching a pattern

author

Search for text within file contents across directory trees

author

Retrieve detailed metadata about a file or directory

author

Returns the list of directories that this server is allowed to access

author

Provides secure access to specified directories

author

Performs path validation to prevent directory traversal attacks

author

Performs symlink resolution with security checks

author

Detects MIME types

author

Supports text, binary, and image files

author

Applies size limits for inline content and base64 encoding

author

Known failure modes

Size limits for inline content and base64 encoding

Path validation to prevent directory traversal attacks

Symlink resolution with security checks

Sources: author, protocol


Badge & Integration

Embed certification status in your README, docs, or CI pipeline

Fidensa Certified badge for mark3labs-filesystem-server
badge SVG →attestation API →integration guide →

Certification Notes

Provenance observations from the pipeline

publisher

Publisher "unknown" is not verified — first certification from this publisher

permissions

Capability requires filesystem write access — review scope of file operations

provenance

No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process

provenance

Single contributor — no peer review evidence in commit history

provenance

Package description appears to be boilerplate or template text


Signed Artifact

Certification provenance and verification metadata

Content hashsha256:2758ed5c917bae4c4aecafa8374defec4b4322718abc0f7f45779a63d155a4ab
Key IDkms-9db4ed3b9f53
CertifiedMar 28, 2026
ExpiresMar 28, 2027
Pipeline version1.0
Statusvalid