ToolTrust
C25/100
dvcrn

mcp-server-siri-shortcuts

mcp1.1.0

@dvcrn

MCP for calling Siri Shorcuts from LLMs

By dvcrn | 1 findings | Scanned 3/22/2026 | tooltrust-scanner/v0.1.15

1 Critical

Security Findings (1)

  • CriticalArbitrary Code Execution

    run_shortcut:tool name or description implies arbitrary script/code execution (evaluate_script, execute javascript, etc.)

    Rule: AS-006Fix: This tool can execute arbitrary code or shell commands on the host system. Remove it unless strictly required. If kept: (1) restrict access to trusted users/agents only, (2) require human approval before each invocation (Claude Desktop: set approval_required: true; other clients: enable equivalent confirmation), (3) use the most restrictive sandbox or read-only mode available, and (4) never expose this tool to untrusted input sources.

Scan this tool yourself

Reproduce this audit locally or block risky tools in CI.

Install once, then scan any MCP server:

$ curl -sfL https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-scanner/main/install.sh | bash
$ tooltrust-scanner scan --server "npx -y mcp-server-siri-shortcuts"

Adjust the package name if your npm registry name differs from the tool ID. View source

Add badge to your README

Copy this Markdown to show your ToolTrust grade on GitHub.

[![ToolTrust Grade C](https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-directory/main/docs/badges/grade-c.svg)](https://github.com/AgentSafe-AI/tooltrust-directory)