B15/100

ida-pro-mcp
mcp1.4.0AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
By mrexodia | 3 findings | Scanned 3/20/2026 | tooltrust-scanner/v0.1.11
1 High2 Low
Security Findings (3)
- HighInsecure Secret Handling
prompt_template_library:input parameter "api_key" appears to accept a secret or credential
Rule: AS-010Fix: Avoid accepting raw credentials as input parameters. Use secret managers (e.g. 1Password CLI, AWS Secrets Manager) and ensure credentials are never logged or stored in agent traces. - LowExcessive Permission Surface
purchase_pro_key:tool declares http permission
Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories. - LowDoS Resilience — Missing Rate Limit / Timeout
purchase_pro_key:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
Rule: AS-011Fix: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent.
Scan this tool yourself
Reproduce this audit locally or block risky tools in CI.
Install once, then scan any MCP server:
$ curl -sfL https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-scanner/main/install.sh | bash$ tooltrust-scanner scan --server "npx -y ida-pro-mcp"Adjust the package name if your npm registry name differs from the tool ID. View source
Add badge to your README
Copy this Markdown to show your ToolTrust grade on GitHub.
[](https://github.com/AgentSafe-AI/tooltrust-directory)