Expose security vulnerabilities, deceptive constructs, and unfinished code before they reach production. Reveal architectural and design pattern usage with clear, actionable guidance to improve consistency and maintainability. Generate concise visual reports that highlight strengths and prioritize issues to speed up reviews and refactoring.
| Field | Value |
|---|---|
| Grade | B |
| Risk Score | 16 |
| Version | smithery |
| Vendor | Smithery |
| Source | salrad-code-sentinel |
| Scan Date | 2026-04-19 |
| Scanner | tooltrust-scanner/v0.3.8 |
| Severity | Count |
|---|---|
| Critical | 0 |
| High | 0 |
| Medium | 8 |
| Low | 0 |
| Info | 7 |
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Medium
Description: tool declares db permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: Medium
Description: tool declares fs permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Scored using ToolTrust methodology · Raw JSON report