Hi team π
I ran a free security scan of browserbase/mcp-server-browserbase using MCPSafe β a purpose-built scanner for MCP servers that uses a 5-LLM consensus panel to detect prompt injection risks, over-scoped tool schemas, supply chain issues, and more.
Results: 81/100 Β· Grade B
| Severity |
Count |
| π΄ Critical |
0 |
| π High |
0 |
| π‘ Medium |
16 |
| π’ Low |
0 |
Summary: 16 medium-severity findings β review recommended
π Full report with findings and evidence: https://mcpsafe.io/registry/github/browserbase/mcp-server-browserbase
Add a security badge to your README
Paste this into your README to show users the current security status:
[](https://mcpsafe.io/registry/github/browserbase/mcp-server-browserbase)
This badge auto-updates whenever a new scan runs.
Feel free to close this if you're already tracking these findings. Happy to answer any questions about the methodology or specific issues.
β Truong BUI Β· mcpsafe.io
Hi team π
I ran a free security scan of browserbase/mcp-server-browserbase using MCPSafe β a purpose-built scanner for MCP servers that uses a 5-LLM consensus panel to detect prompt injection risks, over-scoped tool schemas, supply chain issues, and more.
Results: 81/100 Β· Grade B
Summary: 16 medium-severity findings β review recommended
π Full report with findings and evidence: https://mcpsafe.io/registry/github/browserbase/mcp-server-browserbase
Add a security badge to your README
Paste this into your README to show users the current security status:
This badge auto-updates whenever a new scan runs.
Feel free to close this if you're already tracking these findings. Happy to answer any questions about the methodology or specific issues.
β Truong BUI Β· mcpsafe.io