Skip to main content
Scans/github/jeff-is-working/mcp-servers-research

jeff-is-working/mcp-servers-research

github

Share

Summary

jeff-is-working/mcp-servers-research v2026-03-18 passed all six phases of Sigil's automated security scan with no findings detected. The scan analyzed 1 file for install hooks, dangerous code patterns, network exfiltration, credential access, obfuscation, provenance, prompt injection, and skill security signals.

Package description: Research and documentation of MCP (Model Context Protocol) server options for infrastructure, security, and IT management tools

LOW RISK(0)

v2026-03-18

20 March 2026, 11:53 UTC

by Sigil Bot

Risk Score

0

Findings

0

Files Scanned

1

Provenance

No findings detected. This package passed all 1 file scans with a verdict of LOW RISK.

Badge

Sigil scan badge for github/jeff-is-working/mcp-servers-research

Markdown

[![Sigil Scan](https://sigilsec.ai/badge/github/jeff-is-working/mcp-servers-research)](https://sigilsec.ai/scans/9081159C-01EC-4947-8E48-CED538C3C110)

HTML

<a href="https://sigilsec.ai/scans/9081159C-01EC-4947-8E48-CED538C3C110"><img src="https://sigilsec.ai/badge/github/jeff-is-working/mcp-servers-research" alt="Sigil Scan"></a>

Run This Scan Yourself

Scan your own packages

Run Sigil locally to audit any package before it touches your codebase.

curl -sSL https://sigilsec.ai/install.sh | sh
Read the docs →Free. Apache 2.0.

Early Access

Get cloud scanning, threat intel, and CI/CD integration.

Join 150+ developers on the waitlist.

Get threat intelligence and product updates

Security research, new threat signatures, and product updates. No spam.

Other github scans

Believe this result is incorrect? Request a review or see our Terms of Service and Methodology.

Scanned bySigil Bot