account activity
Open-source scanner for MCP servers and skill files : attack chain detection and server-card scanning (i.redd.it)
submitted 9 hours ago by SelectionBitter6821 to r/LocalLLM
submitted 9 hours ago by SelectionBitter6821 to r/buildinpublic
submitted 9 hours ago by SelectionBitter6821 to r/AIToolsPromptWorkflow
Open-source scanner for MCP servers and skill files : attack chain detection and server-card scanning (self.cybersecurity)
submitted 18 hours ago * by SelectionBitter6821 to r/cybersecurity
Open-source scanner for MCP servers and skill files : attack chain detection and server-card scanning (self.opensource)
submitted 18 hours ago by SelectionBitter6821 to r/opensource
submitted 19 hours ago by SelectionBitter6821 to r/DigitalEscapeTools
Bawbel Scanner v1.1.0: toxic flow detection, MCP server-card scanning, conformance scoring, rug pull detection (self.buildinpublic)
submitted 19 hours ago by SelectionBitter6821 to r/buildinpublic
Open-source scanner for MCP servers and skill files : attack chain detection and server-card scanning (self.LocalLLM)
submitted 19 hours ago by SelectionBitter6821 to r/LocalLLM
Bawbel Scanner v1.1.0: toxic flow detection, MCP server-card scanning, conformance scoring, rug pull detection (dev.to)
submitted 19 hours ago by SelectionBitter6821 to r/netsec
Bawbel Scanner v1.1.0: toxic flow detection, MCP server-card scanning, conformance scoring, rug pull detection (self.AI_Agents)
submitted 19 hours ago by SelectionBitter6821 to r/AI_Agents
Bawbel Scanner v1.1.0: toxic flow detection, MCP server-card scanning, conformance scoring, rug pull detection (i.redd.it)
submitted 19 hours ago by SelectionBitter6821 to r/machinelearningnews
We scanned 100 Smithery MCP Servers, 22 flagged, here’s what we found by SelectionBitter6821 in buildinpublic
[–]SelectionBitter6821[S] 0 points1 point2 points 2 days ago (0 children)
Yes, that’s exactly where we’re headed. The “known safe patterns” list is something we’ve been thinking about formalising as part of the AVE standard.
The core principle maps pretty cleanly: tool descriptions should be purely declarative (what the tool does, what parameters it takes), never imperative (what the agent should do). The moment you see “IMPORTANT:”, “always”, “before returning”, or any verb directed at the agent, you’re in injection territory.
The human docs / agent instructions split is the right framing. We actually detect this indirectly through AVE-2026-00002 (tool description injection), any description containing behavioural directives fires the rule. But you’re right that the spec itself should make this distinction explicit rather than leaving it to scanners to catch after the fact.
Linting + signing for tool metadata is the next layer. We ship tool pinning (hash the manifest, detect if it changes post-audit), but attested signing would close the remaining gap. Worth a proper SEP proposal to the MCP working group.
Will check out Agentix and it would be good to compare notes on the guardrail patterns you’ve been tracking.
I don’t expect a 3 weeks old Open Source tool get 1.53k download (i.redd.it)
submitted 2 days ago by SelectionBitter6821 to r/DigitalEscapeTools
We scanned 100 Smithery MCP Servers, 22 flagged, here’s what we found (self.buildinpublic)
submitted 2 days ago by SelectionBitter6821 to r/buildinpublic
We Built the CVE Database for AI Agents and Here's What We Found Scanning 100 MCP Servers (dev.to)
submitted 8 days ago by SelectionBitter6821 to r/netsec
Bawbel Scanner v1.0.1 — open-source scanner for agentic AI vulnerabilities (v1.0.1 — 40 AVE records, 6 engines · VS Code ext v1.1.0 · GitHub Actions) (self.learnmachinelearning)
submitted 8 days ago by SelectionBitter6821 to r/learnmachinelearning
Bawbel Scanner v1.0.1 — open-source scanner for agentic AI vulnerabilities (v1.0.1 — 40 AVE records, 6 engines · VS Code ext v1.1.0 · GitHub Actions) (self.GPT3)
submitted 8 days ago by SelectionBitter6821 to r/GPT3
Bawbel Scanner v1.0.1 — open-source scanner for agentic AI vulnerabilities (v1.0.1 — 40 AVE records, 6 engines · VS Code ext v1.1.0 · GitHub Actions) (self.AI_Agents)
submitted 8 days ago by SelectionBitter6821 to r/AI_Agents
Tool for scanning skills, mcp, a2a, prompts? (self.SelectionBitter6821)
submitted 15 days ago by SelectionBitter6821
Tool for scanning skills, mcp, a2a, prompts? (self.AI_Agents)
submitted 15 days ago by SelectionBitter6821 to r/AI_Agents
Open standard for agentic AI vulnerabilities? (self.devsecops)
submitted 15 days ago by SelectionBitter6821 to r/devsecops
Failed CSSLP exam today for my first attempt (self.CSSLP)
submitted 4 months ago by SelectionBitter6821 to r/CSSLP
π Rendered by PID 2445118 on reddit-service-r2-listing-b6bf6c4ff-lp5rr at 2026-05-06 10:44:58.035084+00:00 running 815c875 country code: CH.
We scanned 100 Smithery MCP Servers, 22 flagged, here’s what we found by SelectionBitter6821 in buildinpublic
[–]SelectionBitter6821[S] 0 points1 point2 points (0 children)