MCP Atlassian has SSRF via unvalidated X-Atlassian-Jira-Url
TaskWeaver has Protection Mechanism Failure and Server-Side Request Forgery
LangChain vulnerable to unsafe deserialization of attacker-controlled objects through
PraisonAI: Unauthenticated Information Disclosure of Agent Instructions via /api/agents in
wireshark-mcp vulnerable to arbitrary file write via export_objects
PPTAgent: Arbitrary Code Execution via Python eval() of LLM-Generated
OpenClaw's gateway config mutation guard allowed unsafe model-driven
OpenClaw: Agent gateway config mutations could change protected operator settings
Gemini CLI: Remote Code Execution via workspace trust and tool
SSH/SCP option injection allowing local RCE in @aiondadotcom/mcp-ssh
PraisonAIAgents: SSRF via unvalidated URL in `web_crawl` httpx fallback
PraisonAI: Hardcoded `approval_mode="auto"` in Chainlit UI Overrides Administrator
openclaw-claude-bridge: sandbox is not effective - `--allowed-tools ""` does
PraisonAI Has SSRF in FileTools.download_file() via Unvalidated URL
AI Threat Alert