ToolTrust
C40/100
Smithery

ticktick

mcpsmithery

@Smithery

TickTick MCP server for task management and to-do list operations.

By Smithery | 15 findings | Scanned 3/22/2026 | tooltrust-scanner/v0.1.15

3 High8 Medium4 Low

Security Findings (15)

  • HighExcessive Permission Surface ×2
    • TICKTICK_OAUTH2_AUTHORIZATION_STEP1:tool declares network permission
    • TICKTICK_OAUTH2_AUTHORIZATION_STEP_1:tool declares network permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • HighTool Shadowing

    TICKTICK_OAUTH2_AUTHORIZATION_STEP_1:tool name "TICKTICK_OAUTH2_AUTHORIZATION_STEP_1" duplicates "TICKTICK_OAUTH2_AUTHORIZATION_STEP1" already registered in this tool set — a malicious server can shadow a trusted tool by registering an identical name

    Rule: AS-013Fix: Two or more tools registered in your MCP environment share an identical or near-identical name. A malicious server can shadow a trusted tool this way, intercepting calls you intend for the legitimate tool. Remove the conflicting server or rename its tools to be unambiguous.
  • MediumExcessive Permission Surface ×8
    • TICKTICK_CREATE_PROJECT:tool declares fs permission
    • TICKTICK_CREATE_TASK:tool declares fs permission
    • TICKTICK_DELETE_PROJECT:tool declares fs permission
    • TICKTICK_DELETE_TASK:tool declares fs permission
    • TICKTICK_OAUTH2_AUTHORIZATION_STEP1:tool declares fs permission
    • TICKTICK_OAUTH2_AUTHORIZATION_STEP_1:tool declares fs permission
    • TICKTICK_UPDATE_PROJECT:tool declares fs permission
    • TICKTICK_UPDATE_TASK:tool declares fs permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • LowExcessive Permission Surface ×2
    • TICKTICK_CREATE_TASK:input schema exposes 13 properties (threshold: 10)
    • TICKTICK_UPDATE_TASK:input schema exposes 14 properties (threshold: 10)
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • LowDoS Resilience — Missing Rate Limit / Timeout ×2
    • TICKTICK_OAUTH2_AUTHORIZATION_STEP1:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • TICKTICK_OAUTH2_AUTHORIZATION_STEP_1:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    Rule: AS-011Fix: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent.

Scan this tool yourself

Reproduce this audit locally or block risky tools in CI.

Install once, then scan any MCP server:

$ curl -sfL https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-scanner/main/install.sh | bash
$ tooltrust-scanner scan --server "npx -y ticktick"

Adjust the package name if your npm registry name differs from the tool ID. View source

Add badge to your README

Copy this Markdown to show your ToolTrust grade on GitHub.

[![ToolTrust Grade C](https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-directory/main/docs/badges/grade-c.svg)](https://github.com/AgentSafe-AI/tooltrust-directory)