Hi team π
I ran a free deep security scan of MiniMax-AI/MiniMax-MCP using MCPSafe β a purpose-built scanner for MCP servers using a 5-LLM consensus panel to detect prompt injection risks, over-scoped tool schemas, supply chain issues, and more.
Results: 91/100 Β· Grade B
| Severity |
Count |
| π΄ Critical |
0 |
| π High |
0 |
| π‘ Medium |
6 |
| π’ Low |
0 |
Summary: 6 medium-severity findings around MiniMax API tool schemas and AI model access permissions. No critical or high findings.
π Full report with findings and evidence: https://mcpsafe.io/registry/github/MiniMax-AI/MiniMax-MCP
Add a security badge to your README
[](https://mcpsafe.io/registry/github/MiniMax-AI/MiniMax-MCP)
This badge auto-updates whenever a new scan runs β great for showing users and enterprise customers your security posture at a glance.
Feel free to close this if you're already tracking these findings. Happy to answer any questions about specific findings.
β Truong BUI Β· mcpsafe.io
Hi team π
I ran a free deep security scan of MiniMax-AI/MiniMax-MCP using MCPSafe β a purpose-built scanner for MCP servers using a 5-LLM consensus panel to detect prompt injection risks, over-scoped tool schemas, supply chain issues, and more.
Results: 91/100 Β· Grade B
Summary: 6 medium-severity findings around MiniMax API tool schemas and AI model access permissions. No critical or high findings.
π Full report with findings and evidence: https://mcpsafe.io/registry/github/MiniMax-AI/MiniMax-MCP
Add a security badge to your README
This badge auto-updates whenever a new scan runs β great for showing users and enterprise customers your security posture at a glance.
Feel free to close this if you're already tracking these findings. Happy to answer any questions about specific findings.
β Truong BUI Β· mcpsafe.io