An MCP server that executes Python code in isolated rootless containers with optional MCP server proxying. Implementation of Anthropic's and Cloudflare's ideas for reducing MCP tool definitions context bloat.
| Field | Value |
|---|---|
| Grade | D |
| Risk Score | 63 |
| Version | sha-27d23b8e2c76 |
| Vendor | elusznik |
| Stars | ⭐ 325 |
| Language | Python |
| Source | mcp-server-code-execution-mode |
| Scan Date | 2026-05-05 |
| Scanner | tooltrust-scanner/v0.3.9 |
| Severity | Count |
|---|---|
| Critical | 2 |
| High | 4 |
| Medium | 5 |
| Low | 1 |
| Info | 5 |
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: High
Description: tool declares exec permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Critical
Description: tool name or description implies arbitrary script/code execution (evaluate_script, execute javascript, etc.)
Recommendation: This tool can execute arbitrary code or shell commands on the host system. Remove it unless strictly required. If kept: (1) restrict access to trusted users/agents only, (2) require human approval before each invocation (Claude Desktop: set approval_required: true; other clients: enable equivalent confirmation), (3) use the most restrictive sandbox or read-only mode available, and (4) never expose this tool to untrusted input sources.
Severity: Low
Description: tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
Recommendation: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: High
Description: tool declares network permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: High
Description: tool declares exec permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Critical
Description: tool name or description implies arbitrary script/code execution (evaluate_script, execute javascript, etc.)
Recommendation: This tool can execute arbitrary code or shell commands on the host system. Remove it unless strictly required. If kept: (1) restrict access to trusted users/agents only, (2) require human approval before each invocation (Claude Desktop: set approval_required: true; other clients: enable equivalent confirmation), (3) use the most restrictive sandbox or read-only mode available, and (4) never expose this tool to untrusted input sources.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: High
Description: tool declares exec permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Scored using ToolTrust methodology · Raw JSON report