Skip to content

Conversation

@lwsinclair
Copy link

Hi there,

This pull request shares a security update on clicksend-mcp-server.

We also have an entry for clicksend-mcp-server in our directory, MseeP.ai, where we provide regular security and trust updates on your app.

We invite you to add our badge for your MCP server to your README to help your users learn from a third party that provides ongoing validation of clicksend-mcp-server.

You can easily take control over your listing for free: visit it at https://mseep.ai/app/clicksend-clicksend-mcp-server.

Yours Sincerely,

Lawrence W. Sinclair
CEO/SkyDeck AI
Founder of MseeP.ai
MCP servers you can trust


MseeP.ai Security Assessment Badge

Here are our latest evaluation results of clicksend-mcp-server

Security Scan Results

Security Score: 96/100

Risk Level: low

Scan Date: 2025-06-13

Score starts at 100, deducts points for security issues, and adds points for security best practices

Detected Vulnerabilities

Medium Severity

  • brace-expansion

    • [{'source': 1105443, 'name': 'brace-expansion', 'dependency': 'brace-expansion', 'title': 'brace-expansion Regular Expression Denial of Service vulnerability', 'url': 'https://github.com/advisories/GHSA-v6h2-p8h4-qcjw', 'severity': 'low', 'cwe': ['CWE-400'], 'cvss': {'score': 3.1, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}, 'range': '>=1.0.0 <=1.1.11'}]
    • Fixed in version: unknown
  • request

    • [{'source': 1096727, 'name': 'request', 'dependency': 'request', 'title': 'Server-Side Request Forgery in Request', 'url': 'https://github.com/advisories/GHSA-p8p7-x288-28g6', 'severity': 'moderate', 'cwe': ['CWE-918'], 'cvss': {'score': 6.1, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}, 'range': '<=2.88.2'}, 'tough-cookie']
    • Fixed in version: unknown
  • tough-cookie

    • [{'source': 1097682, 'name': 'tough-cookie', 'dependency': 'tough-cookie', 'title': 'tough-cookie Prototype Pollution vulnerability', 'url': 'https://github.com/advisories/GHSA-72xf-g2v4-qvf3', 'severity': 'moderate', 'cwe': ['CWE-1321'], 'cvss': {'score': 6.5, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}, 'range': '<4.1.3'}]
    • Fixed in version: unknown

This security assessment was conducted by MseeP.ai, an independent security validation service for MCP servers. Visit our website to learn more about our security reviews.

Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds an external security assessment badge to the project README to link to a third-party listing for ongoing validation of clicksend-mcp-server.

Changes:

  • Add MseeP.ai security assessment badge at the top of README.md.
  • Link the badge to the MseeP.ai app page for this project.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@@ -1,3 +1,5 @@
[![MseeP.ai Security Assessment Badge](https://mseep.net/pr/clicksend-clicksend-mcp-server-badge.png)](https://mseep.ai/app/clicksend-clicksend-mcp-server)
Copy link

Copilot AI Jan 21, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Embedding a third-party-hosted image in the README means every page view will request https://mseep.net/..., which can leak viewer IP/user-agent/referrer and creates an external dependency for rendering. Consider hosting the badge image in this repo (or as a GitHub asset) and/or using a cached badge provider to avoid third-party tracking and availability issues; keep the outbound link to the assessment page if desired.

Suggested change
[![MseeP.ai Security Assessment Badge](https://mseep.net/pr/clicksend-clicksend-mcp-server-badge.png)](https://mseep.ai/app/clicksend-clicksend-mcp-server)
[View the MseeP.ai Security Assessment for this project](https://mseep.ai/app/clicksend-clicksend-mcp-server)

Copilot uses AI. Check for mistakes.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant