Strapi MCP — security audit

Strapi MCP: trust score 43/100 — 3 capability surfaces.

Trust score

43

Grade D

Risk flags

  • Community-authored

    Maintained by Community. Confirm the repo and signing before installing.

  • No public repository linked

    Without a public repo we cannot independently audit the code. Caution warranted.

Capability surface

  • Process spawn

    Medium risk

    Launches subprocesses via docker, npx, uvx — supply-chain risk if package is compromised.

    Evidence: node

  • Outbound network

    Medium risk

    Calls external APIs (GitHub, Slack, Stripe, etc.). Data leaves the machine.

    Evidence: api

  • Browser automation

    High risk

    Drives a real browser (Playwright, Puppeteer). Can scrape any logged-in service.

    Evidence: headless

Trust signals

Total trust score is the sum of these contributions. Each signal carries a fixed weight.

  • Verified by Loadout

    +20 / 20

    Manually verified.

  • Official author

    +0 / 15

    Maintained by community contributors.

  • Community traction

    +13 / 20

    460 GitHub stars.

  • Public source

    +0 / 15

    No linked public repository.

  • Stability

    +0 / 15

    Stability not yet assessed.

  • Capability surface

    +10 / 15

    1 high-risk capability detected.

Disclaimer

This is an automated heuristic triage. It does not replace a hand-rolled code audit. Use it to prioritise which servers deserve a deeper look — especially anything carrying high-risk capabilities like shell execution or filesystem write.