Back to Home
vbrazo icon

mcp-server-proposal

Verified Safe

by vbrazo

Overview

An AI-powered compliance assistant that automatically analyzes GitHub Pull Requests for security vulnerabilities, license compliance, code quality issues, and custom company rules.

Installation

Run Command
docker-compose up -d

Environment Variables

  • E2B_API_KEY
  • GROQ_API_KEY
  • GROQ_MODEL
  • GITHUB_APP_ID
  • GITHUB_APP_PRIVATE_KEY
  • GITHUB_WEBHOOK_SECRET
  • DATABASE_URL
  • REDIS_URL
  • PORT
  • NODE_ENV
  • LOG_LEVEL
  • NEXT_PUBLIC_API_URL
  • NEXT_PUBLIC_GITHUB_APP_NAME
  • GITHUB_MCP_SERVER_URL

Security Notes

The backend server employs good security practices for its own operation, including `helmet` for HTTP headers, `cors`, `zod` for environment variable validation, `pg` with SSL and connection pooling, and robust webhook signature verification using `crypto.timingSafeEqual`. However, the core functionality involves executing arbitrary code from GitHub PRs within an E2B Code Interpreter sandbox. While E2B aims for isolation, string interpolation is used to build Python scripts for execution within the sandbox (e.g., in `setupMCPServers`, `runAnalysis`, `fetchFileFromGitHub`, `runSecurityScan`), which, if not perfectly sanitized or if an input escapes the JSON/string context, could lead to code injection within the sandbox environment. The repository also explicitly includes `demo-repos` with 'intentional security vulnerabilities' (hardcoded secrets, SQL injection, weak crypto, `eval` usage), which while serving a testing purpose, highlight patterns that could be dangerous if run outside the intended sandbox context.

Similar Servers

Stats

Interest Score32
Security Score7
Cost ClassMedium
Avg Tokens7500
Stars1
Forks0
Last Update2025-11-22

Tags

compliancesecuritygithubaicode-analysis