Summary
equinix/mcp v2026-03-19 passed all six phases of Sigil's automated security scan with no findings detected. The scan analyzed 1 file for install hooks, dangerous code patterns, network exfiltration, credential access, obfuscation, provenance, prompt injection, and skill security signals.
Package description: This repository contains a list of Equinix's official Model Context Protocol(MCP) servers, guidance on how to use remote MCP Servers and examples to get started
v2026-03-19
20 March 2026, 00:44 UTC
by Sigil Bot
Risk Score
0
Findings
0
Files Scanned
1
Provenance
Registry
https://github.com/equinix/mcpRepository
https://github.com/equinix/mcpScanned From
https://github.com/equinix/mcp.gitNo findings detected. This package passed all 1 file scans with a verdict of LOW RISK.
Badge
Markdown
[](https://sigilsec.ai/scans/DEA67816-19D8-41C3-B506-A4550A889439)HTML
<a href="https://sigilsec.ai/scans/DEA67816-19D8-41C3-B506-A4550A889439"><img src="https://sigilsec.ai/badge/github/equinix/mcp" alt="Sigil Scan"></a>Run This Scan Yourself
Scan your own packages
Run Sigil locally to audit any package before it touches your codebase.
Early Access
Get cloud scanning, threat intel, and CI/CD integration.
Join 150+ developers on the waitlist.
Get threat intelligence and product updates
Security research, new threat signatures, and product updates. No spam.
Other github scans
Believe this result is incorrect? Request a review or see our Terms of Service and Methodology.