-
Notifications
You must be signed in to change notification settings - Fork 197
External analysis server returning 500 Internal Server Error - preventing security scanning #75
Copy link
Copy link
Open
Description
Problem
The mcp-scan tool is unable to perform security analysis due to 500 Internal Server Error responses from the external analysis server (invariantlabs.ai API). This affects both the official release and local builds.
Steps to Reproduce
- Run mcp-scan on any MCP configuration file:
uvx mcp-scan@latest --verbose [config-file-path]
- Observe that all tools show:
[X001]: could not reach analysis server Error: 500 - Internal Server Error
Expected Behavior
- Tools should be analyzed for security vulnerabilities
- Should receive security analysis results from the external API
- Tools should show security status (safe/vulnerable) instead of 500 errors
Actual Behavior
- All tools show X001 errors with "500 - Internal Server Error"
- No security analysis is performed
- Tool discovery works correctly, but vulnerability analysis fails
Environment
- mcp-scan version: v0.3.2 (latest)
- OS: macOS
- Configuration: Multiple MCP servers (Slack, Obsidian, GitHub, Serena)
- Total tools affected: 40+ tools across all servers
Additional Context
- Tool discovery and enumeration works perfectly
- The issue appears to be with the external analysis API endpoint
- Both
--opt-outand regular modes show the same external API issues - This prevents users from getting the core security analysis functionality
Impact
- Users cannot identify security vulnerabilities in their MCP configurations
- The primary security scanning functionality is unavailable
- Tool inventory works, but security analysis is completely blocked
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels