Skip to content

Add MseeP.ai badge#2

Open
mseep-ai wants to merge 1 commit into
wimi321:mainfrom
mseep-ai:add-mseep-badge
Open

Add MseeP.ai badge#2
mseep-ai wants to merge 1 commit into
wimi321:mainfrom
mseep-ai:add-mseep-badge

Conversation

@mseep-ai
Copy link
Copy Markdown

@mseep-ai mseep-ai commented May 7, 2026

Hi there,

This pull request shares a security update on macos-computer-use-skill.

We also have an entry for macos-computer-use-skill in our directory, MseeP.ai, where we provide regular security and trust updates on your app.

We invite you to add our badge for your MCP server to your README to help your users learn from a third party that provides ongoing validation of macos-computer-use-skill.

You can easily take control over your listing for free: visit it at https://mseep.ai/app/wimi321-macos-computer-use-skill.

Thanks,

The MseeP Team
MCP servers you can trust


MseeP.ai Security Assessment Badge

Here are our latest evaluation results of macos-computer-use-skill

Security Scan Results

Security Score: 91/100

Risk Level: low

Scan Date: 2026-05-07

Score starts at 100, deducts points for security issues, and adds points for security best practices

Detected Vulnerabilities

Medium Severity

  • @hono/node-server

    • [{'source': 1116281, 'name': '@hono/node-server', 'dependency': '@hono/node-server', 'title': '@hono/node-server: Middleware bypass via repeated slashes in serveStatic', 'url': 'https://github.com/advisories/GHSA-92pp-h63x-v22m', 'severity': 'moderate', 'cwe': ['CWE-22'], 'cvss': {'score': 5.3, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}, 'range': '<1.19.13'}]
    • Fixed in version: unknown
  • express-rate-limit

    • ['ip-address']
    • Fixed in version: unknown
  • hono

    • [{'source': 1116244, 'name': 'hono', 'dependency': 'hono', 'title': 'Hono missing validation of cookie name on write path in setCookie()', 'url': 'https://github.com/advisories/GHSA-26pp-8wgv-hjvm', 'severity': 'moderate', 'cwe': ['CWE-113'], 'cvss': {'score': 5.3, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}, 'range': '<4.12.12'}, {'source': 1116277, 'name': 'hono', 'dependency': 'hono', 'title': 'Hono: Non-breaking space prefix bypass in cookie name handling in getCookie()', 'url': 'https://github.com/advisories/GHSA-r5rp-j6wh-rvv4', 'severity': 'moderate', 'cwe': ['CWE-20'], 'cvss': {'score': 4.8, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}, 'range': '<4.12.12'}, {'source': 1116279, 'name': 'hono', 'dependency': 'hono', 'title': 'Hono: Path traversal in toSSG() allows writing files outside the output directory', 'url': 'https://github.com/advisories/GHSA-xf4j-xp2r-rqqx', 'severity': 'moderate', 'cwe': ['CWE-22'], 'cvss': {'score': 0, 'vectorString': None}, 'range': '>=4.0.0 <=4.12.11'}, {'source': 1116280, 'name': 'hono', 'dependency': 'hono', 'title': 'Hono: Middleware bypass via repeated slashes in serveStatic', 'url': 'https://github.com/advisories/GHSA-wmmm-f939-6g9c', 'severity': 'moderate', 'cwe': ['CWE-22'], 'cvss': {'score': 5.3, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}, 'range': '<4.12.12'}, {'source': 1116669, 'name': 'hono', 'dependency': 'hono', 'title': 'hono Improperly Handles JSX Attribute Names Allows HTML Injection in hono/jsx SSR', 'url': 'https://github.com/advisories/GHSA-458j-xx4x-4375', 'severity': 'moderate', 'cwe': ['CWE-79'], 'cvss': {'score': 4.3, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}, 'range': '<4.12.14'}, {'source': 1117087, 'name': 'hono', 'dependency': 'hono', 'title': 'Hono has incorrect IP matching in ipRestriction() for IPv4-mapped IPv6 addresses', 'url': 'https://github.com/advisories/GHSA-xpcf-pg52-r92g', 'severity': 'moderate', 'cwe': ['CWE-180'], 'cvss': {'score': 5.3, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}, 'range': '<4.12.12'}, {'source': 1117763, 'name': 'hono', 'dependency': 'hono', 'title': 'Hono: bodyLimit() can be bypassed for chunked / unknown-length requests', 'url': 'https://github.com/advisories/GHSA-9vqf-7f2p-gf9v', 'severity': 'moderate', 'cwe': ['CWE-400'], 'cvss': {'score': 6.5, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}, 'range': '<4.12.16'}, {'source': 1117764, 'name': 'hono', 'dependency': 'hono', 'title': 'hono/jsx has Unvalidated JSX Tag Names that May Allow HTML Injection', 'url': 'https://github.com/advisories/GHSA-69xw-7hcm-h432', 'severity': 'moderate', 'cwe': ['CWE-74'], 'cvss': {'score': 4.7, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}, 'range': '<4.12.16'}]
    • Fixed in version: unknown
  • ... and 1 more medium severity vulnerabilities

This security assessment was conducted by MseeP.ai, an independent security validation service for MCP servers. Visit our website to learn more about our security reviews.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant