D65/100

apify-mcp-server
mcp0.9.12The Apify MCP server enables your AI agents to extract data from social media, search engines, maps, e-commerce sites, or any other website using thousands of ready-made scrapers, crawlers, and automation tools available on the Apify Store.
By apify | 36 findings | Scanned 3/22/2026 | tooltrust-scanner/v0.1.15
2 Critical10 High15 Medium9 Low
Security Findings (36)
- CriticalArbitrary Code Execution ×2
- Bash:tool name or description implies arbitrary script/code execution (evaluate_script, execute javascript, etc.)
- Grep:tool name or description implies arbitrary script/code execution (evaluate_script, execute javascript, etc.)
Rule: AS-006Fix: This tool can execute arbitrary code or shell commands on the host system. Remove it unless strictly required. If kept: (1) restrict access to trusted users/agents only, (2) require human approval before each invocation (Claude Desktop: set approval_required: true; other clients: enable equivalent confirmation), (3) use the most restrictive sandbox or read-only mode available, and (4) never expose this tool to untrusted input sources. - HighExcessive Permission Surface ×10
- Task:tool declares network permission
- Task:tool declares exec permission
- Bash:tool declares network permission
- Bash:tool declares exec permission
- WebFetch:tool declares network permission
- TodoWrite:tool declares network permission
- TodoWrite:tool declares exec permission
- WebSearch:tool declares network permission
- BashOutput:tool declares exec permission
- KillBash:tool declares exec permission
Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories. - MediumExcessive Permission Surface ×15
- Task:tool declares fs permission
- Bash:tool declares fs permission
- Glob:tool declares fs permission
- Grep:tool declares fs permission
- LS:tool declares fs permission
- ExitPlanMode:tool declares fs permission
- Read:tool declares fs permission
- Edit:tool declares fs permission
- MultiEdit:tool declares fs permission
- Write:tool declares fs permission
- NotebookEdit:tool declares fs permission
- WebFetch:tool declares fs permission
- TodoWrite:tool declares fs permission
- TodoWrite:tool declares db permission
- WebSearch:tool declares db permission
Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories. - LowDoS Resilience — Missing Rate Limit / Timeout ×7
- Task:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
- Bash:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
- WebFetch:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
- TodoWrite:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
- WebSearch:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
- BashOutput:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
- KillBash:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
Rule: AS-011Fix: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent. - LowExcessive Permission Surface ×2
- WebFetch:tool declares http permission
- WebSearch:tool declares http permission
Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Scan this tool yourself
Reproduce this audit locally or block risky tools in CI.
Install once, then scan any MCP server:
$ curl -sfL https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-scanner/main/install.sh | bash$ tooltrust-scanner scan --server "npx -y apify-mcp-server"Adjust the package name if your npm registry name differs from the tool ID. View source
Add badge to your README
Copy this Markdown to show your ToolTrust grade on GitHub.
[](https://github.com/AgentSafe-AI/tooltrust-directory)