mcp-run-python

PyPI

Is mcp-run-python safe to use?

Based on the latest brin safety scan, no vulnerabilities or threats were detected for mcp-run-python v0.0.22. Trust score: 75/100. 2 known CVEs, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.

Install (safety-checked)

mcp-run-python Passed Security Checks

No security concerns detected

clean
CVEs

2

Threats

0

Install Scripts

0

Risk Indicators

  • GHSA-6fgp-m6q4-j3q5: UNKNOWN
  • GHSA-pfv4-wmph-5gc6: UNKNOWN

mcp-run-python CVE Vulnerabilities (2)

MCP Run Python Deno Sandbox Misconfiguration Allows SSRF Attacks via Localhost Access

MCP Run Python has a Sandbox Escape & Server Takeover Vulnerability

No Concerns Detected

No security concerns detected in the latest brin assessment. This is an automated, point-in-time evaluation — security posture may change.

This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.

mcp-run-python Capabilities & Permissions

What mcp-run-python can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.

Filesystem Access

Reads and writes to the filesystem.

Process Spawning

This package can spawn child processes.

AGENTS.md for mcp-run-python

Good instructions lead to good results. brin adds mcp-run-python documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.

brin init

Vercel's research: 100% accuracy with AGENTS.md vs 53% without →

mcp-run-python Documentation & Source Code

For the full mcp-run-python README, API documentation, and source code, visit the official package registry.

Frequently asked questions about mcp-run-python safety

Weekly Downloads

26.0K

Version

0.0.22

Last Scanned

Feb 12, 2026

Trust Score

75/100·Legitimacy signals, not safety

CVEs (2)

GHSA-6fgp-m6q4-j3q5

MCP Run Python Deno Sandbox Misconfiguration Allows SSRF Attacks via Localhost Access

GHSA-pfv4-wmph-5gc6

MCP Run Python has a Sandbox Escape & Server Takeover Vulnerability

Capabilities

Filesystem

Reads & Writes files

Process

Spawns child processes

Is mcp-run-python Safe? | PyPI Safety Scan - brin