Skip to content

Conversation

@lwsinclair
Copy link

Hi there,

This pull request shares a security update on mcp-webcam.

We also have an entry for mcp-webcam in our directory, MseeP.ai, where we provide regular security and trust updates on your app.

We invite you to add our badge for your MCP server to your README to help your users learn from a third party that provides ongoing validation of mcp-webcam.

You can easily take control over your listing for free: visit it at https://mseep.ai/app/evalstate-mcp-webcam.

Yours Sincerely,

Lawrence W. Sinclair
CEO/SkyDeck AI
Founder of MseeP.ai
MCP servers you can trust


MseeP.ai Security Assessment Badge

Here are our latest evaluation results of mcp-webcam

Security Scan Results

Security Score: 93/100

Risk Level: low

Scan Date: 2025-06-13

Score starts at 100, deducts points for security issues, and adds points for security best practices

Detected Vulnerabilities

Medium Severity

  • @babel/helpers

    • [{'source': 1104001, 'name': '@babel/helpers', 'dependency': '@babel/helpers', 'title': 'Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups', 'url': 'https://github.com/advisories/GHSA-968p-4wvh-cqc8', 'severity': 'moderate', 'cwe': ['CWE-1333'], 'cvss': {'score': 6.2, 'vectorString': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}, 'range': '<7.26.10'}]
    • Fixed in version: unknown
  • esbuild

    • [{'source': 1102341, 'name': 'esbuild', 'dependency': 'esbuild', 'title': 'esbuild enables any website to send any requests to the development server and read the response', 'url': 'https://github.com/advisories/GHSA-67mh-4wv8-2f99', 'severity': 'moderate', 'cwe': ['CWE-346'], 'cvss': {'score': 5.3, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}, 'range': '<=0.24.2'}]
    • Fixed in version: unknown
  • vite

    • [{'source': 1102438, 'name': 'vite', 'dependency': 'vite', 'title': 'Websites were able to send any requests to the development server and read the response in vite', 'url': 'https://github.com/advisories/GHSA-vg6x-rcgg-rjx6', 'severity': 'moderate', 'cwe': ['CWE-346', 'CWE-350', 'CWE-1385'], 'cvss': {'score': 6.5, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}, 'range': '>=6.0.0 <=6.0.8'}, {'source': 1103518, 'name': 'vite', 'dependency': 'vite', 'title': 'Vite bypasses server.fs.deny when using ?raw??', 'url': 'https://github.com/advisories/GHSA-x574-m823-4x7w', 'severity': 'moderate', 'cwe': ['CWE-200', 'CWE-284'], 'cvss': {'score': 5.3, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}, 'range': '>=6.0.0 <6.0.12'}, {'source': 1103629, 'name': 'vite', 'dependency': 'vite', 'title': 'Vite has a server.fs.deny bypassed for inline and raw with ?import query', 'url': 'https://github.com/advisories/GHSA-4r4m-qw57-chr8', 'severity': 'moderate', 'cwe': ['CWE-200', 'CWE-284'], 'cvss': {'score': 5.3, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}, 'range': '>=6.0.0 <6.0.13'}, {'source': 1103885, 'name': 'vite', 'dependency': 'vite', 'title': 'Vite has an server.fs.deny bypass with an invalid request-target', 'url': 'https://github.com/advisories/GHSA-356w-63v5-8wf4', 'severity': 'moderate', 'cwe': ['CWE-200'], 'cvss': {'score': 0, 'vectorString': None}, 'range': '>=6.0.0 <6.0.15'}, {'source': 1104174, 'name': 'vite', 'dependency': 'vite', 'title': "Vite's server.fs.deny bypassed with /. for files under project root", 'url': 'https://github.com/advisories/GHSA-859w-5945-r5v3', 'severity': 'moderate', 'cwe': ['CWE-22'], 'cvss': {'score': 0, 'vectorString': None}, 'range': '>=6.0.0 <=6.1.5'}, {'source': 1104203, 'name': 'vite', 'dependency': 'vite', 'title': 'Vite allows server.fs.deny to be bypassed with .svg or relative paths', 'url': 'https://github.com/advisories/GHSA-xcj6-pq6g-qj4x', 'severity': 'moderate', 'cwe': ['CWE-200', 'CWE-284'], 'cvss': {'score': 5.3, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}, 'range': '>=6.0.0 <6.0.14'}, 'esbuild']
    • Fixed in version: unknown
  • ... and 1 more medium severity vulnerabilities

This security assessment was conducted by MseeP.ai, an independent security validation service for MCP servers. Visit our website to learn more about our security reviews.

@evalstate evalstate closed this Oct 22, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants