An MCP server that provides LinkedIn & Reddit data
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"an-mcp-server-that-provides-linkedin-reddit-data": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
This repository is intended for educational purposes to demonstrate the potential security risks in MCP implementations, and how to recognize and prevent security issues.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Click any tool to inspect its schema.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security / data
Manage Supabase projects — databases, auth, storage, and edge functions
🔥 Official Firecrawl MCP Server - Adds powerful web scraping and search to Cursor, Claude and any other LLM clients.
The Apify MCP server enables your AI agents to extract data from social media, search engines, maps, e-commerce sites, or any other website using thousands of ready-made scrapers, crawlers, and automation tools available on the Apify Store.
An official Qdrant Model Context Protocol (MCP) server implementation
MCP Security Weekly
Get CVE alerts and security updates for An MCP server that provides LinkedIn & Reddit data and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.

This repository is intended for educational purposes to demonstrate the potential security risks in MCP implementations, and how to recognize and prevent security issues.
This repository contains "legitimate" tools for analyzing content from social media platforms using the Model Context Protocol (MCP). It demonstrates both the capabilities and potential security implications of MCP tools.
These tools are provided for educational purposes only to demonstrate both the legitimate use cases and security considerations when developing and using MCP tools.
This code is provided for educational purposes only. The authors do not endorse using these techniques for any malicious purposes. Always obtain proper authorization before analyzing content from any platform and respect their terms of service.
The MCP Toolkit provides utilities for extracting and analyzing content from:
The toolkit includes:
See Reddit Readme :: Using embedded code in a remote image
See Linkedin Readme :: Using WebAssembly module embedded in a local image
This toolkit demonstrates several important security aspects of MCP tools:
Code Execution && Obfuscation Techniques: The repository shows how MCP tools can execute code in unexpected ways, including:
Data Access: Tools can access and process data beyond what might be expected:
When developing or using MCP tools:
This project is licensed under the MIT License.
Uri Shamay cmpxchg16@gmail.com