evm-chains-mcp-server
Bazinga640/evm-chains-mcp-serverThe most comprehensive EVM MCP server - 108 tools across 7 chains with complete DeFi suite
High risk — review the findings below
We found multiple concerning patterns in this package. Some of these might be legitimate (for example, a build tool might need to run commands), but you should review each finding below and decide if the explanations make sense for what this package claims to do.
What We Found(10 issues)
Each card explains what was found and what it means in plain English. Click "Technical details" for the full breakdown.
Caution. This package reads your secret passwords and API tokens from your system. If it also has network access, your credentials could be sent to someone else's server. Check WHY it needs your secrets.
Technical details
Reading sensitive environment variables (tokens, secrets, keys, passwords) suggests data exfiltration. MCP servers should declare required env vars, not silently read secrets.
process.env.FLUX_API_KEYCaution. This package reads your secret passwords and API tokens from your system. If it also has network access, your credentials could be sent to someone else's server. Check WHY it needs your secrets.
Technical details
Reading sensitive environment variables (tokens, secrets, keys, passwords) suggests data exfiltration. MCP servers should declare required env vars, not silently read secrets.
process.env.HUGGINGFACE_API_KEYCaution. This package reads your secret passwords and API tokens from your system. If it also has network access, your credentials could be sent to someone else's server. Check WHY it needs your secrets.
Technical details
Reading sensitive environment variables (tokens, secrets, keys, passwords) suggests data exfiltration. MCP servers should declare required env vars, not silently read secrets.
process.env.PLAYGROUND_API_KEYCaution. This package reads your secret passwords and API tokens from your system. If it also has network access, your credentials could be sent to someone else's server. Check WHY it needs your secrets.
Technical details
Reading sensitive environment variables (tokens, secrets, keys, passwords) suggests data exfiltration. MCP servers should declare required env vars, not silently read secrets.
process.env.PINATA_API_KEYCaution. This package reads your secret passwords and API tokens from your system. If it also has network access, your credentials could be sent to someone else's server. Check WHY it needs your secrets.
Technical details
Reading sensitive environment variables (tokens, secrets, keys, passwords) suggests data exfiltration. MCP servers should declare required env vars, not silently read secrets.
process.env.PINATA_API_KEYSuspicious. This package contains hidden encoded text — like a secret message that gets decoded when the code runs. Legitimate packages don't usually hide their code this way. It could be a disguised payload.
Technical details
Long Base64-encoded strings (>128 chars) may contain obfuscated payloads. Legitimate code rarely embeds large encoded blobs inline.
"0xa9059cbb000000000000000000000000742d35cc6634c0532925a3b844bc9e7595f0beb0000000000000000000000000000000000000000000000000de0b6b3a7640000"Suspicious. This package contains hidden encoded text — like a secret message that gets decoded when the code runs. Legitimate packages don't usually hide their code this way. It could be a disguised payload.
Technical details
Long Base64-encoded strings (>128 chars) may contain obfuscated payloads. Legitimate code rarely embeds large encoded blobs inline.
'0x608060405234801561001057600080fd5b50604051610a6a380380610a6a83398101604081905261002f916101f4565b600361003b83826102d5565b50600461004882826102d5565b5060058190556100583382610062565b50505050610395565b6…Suspicious. This package contains hidden encoded text — like a secret message that gets decoded when the code runs. Legitimate packages don't usually hide their code this way. It could be a disguised payload.
Technical details
Long Base64-encoded strings (>128 chars) may contain obfuscated payloads. Legitimate code rarely embeds large encoded blobs inline.
'0x608060405234801561001057600080fd5b50604051610a6a380380610a6a83398101604081905261002f916101f4565b600361003b83826102d5565b50600461004882826102d5565b5060058190556100583382610062565b50505050610395565b6…Suspicious. This package loads code from an unknown location decided at runtime. We can't tell what it will actually run because it depends on a variable. This makes it harder to verify the package is safe.
Technical details
Dynamic require/import with variable arguments loads code determined at runtime. This can be used to load payloads that static analysis can't detect.
import (sSuspicious. This package loads code from an unknown location decided at runtime. We can't tell what it will actually run because it depends on a variable. This makes it harder to verify the package is safe.
Technical details
Dynamic require/import with variable arguments loads code determined at runtime. This can be used to load payloads that static analysis can't detect.
require(sFinding Summary
0
Critical
5
High
5
Medium
0
Low
0
Info