-
Notifications
You must be signed in to change notification settings - Fork 13
Add MseeP.ai badge #3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
WalkthroughA security assessment badge with a hyperlink was added to the top of the README file. No other content or code changes were introduced. Changes
Poem
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 0
🧹 Nitpick comments (2)
README.md (2)
1-1
: External badge host may introduce reliability / privacy risksThe badge pulls its PNG from
https://mseep.net/...
, a domain outside the project’s control.
If that host ever goes down, changes the asset, or serves tracking pixels, the README will break or leak telemetry whenever it’s rendered.Consider one of the following:
- Host the badge image in-repo and keep only the hyperlink external.
- Use a more established badge provider (e.g. shields.io) that lets you proxy arbitrary images.
- If you keep the external image, pin it to an immutable hash-based CDN URL.
1-1
: Alt-text could be more descriptive
MseeP.ai Security Assessment Badge
is service-centric rather than outcome-centric.
A screen-reader user would benefit from wording that conveys the actual score, e.g.
Current security score: 65/100 (high risk) – provided by MseeP.ai
.-[](https://mseep.ai/app/cognitivecomputations-agi-memory) +[](https://mseep.ai/app/cognitivecomputations-agi-memory)Improves accessibility while still crediting the vendor.
Hi there,
This pull request shares a security update on agi-memory.
We also have an entry for agi-memory in our directory, MseeP.ai, where we provide regular security and trust updates on your app.
We invite you to add our badge for your MCP server to your README to help your users learn from a third party that provides ongoing validation of agi-memory.
You can easily take control over your listing for free: visit it at https://mseep.ai/app/cognitivecomputations-agi-memory.
Yours Sincerely,
Lawrence W. Sinclair
CEO/SkyDeck AI
Founder of MseeP.ai
MCP servers you can trust
Here are our latest evaluation results of agi-memory
Security Scan Results
Security Score: 65/100
Risk Level: high
Scan Date: 2025-06-30
Score starts at 100, deducts points for security issues, and adds points for security best practices
Security Findings
Medium Severity Issues
semgrep: Avoiding SQL string concatenation: untrusted input concatenated with raw SQL query can result in SQL Injection. In order to execute raw query safely, prepared statement should be used. SQLAlchemy provides TextualSQL to easily used prepared statement with named parameters. For complex SQL composition, use SQL Expression Language or Schema Definition Language. In most cases, SQLAlchemy ORM will be a better option.
semgrep: Avoiding SQL string concatenation: untrusted input concatenated with raw SQL query can result in SQL Injection. In order to execute raw query safely, prepared statement should be used. SQLAlchemy provides TextualSQL to easily used prepared statement with named parameters. For complex SQL composition, use SQL Expression Language or Schema Definition Language. In most cases, SQLAlchemy ORM will be a better option.
... and 5 more medium severity issues
This security assessment was conducted by MseeP.ai, an independent security validation service for MCP servers. Visit our website to learn more about our security reviews.
Summary by CodeRabbit