Skip to content

Conversation

@lwsinclair
Copy link

Hi there,

This pull request shares a security update on fo-semantic-mcp.

We also have an entry for fo-semantic-mcp in our directory, MseeP.ai, where we provide regular security and trust updates on your app.

We invite you to add our badge for your MCP server to your README to help your users learn from a third party that provides ongoing validation of fo-semantic-mcp.

You can easily take control over your listing for free: visit it at https://mseep.ai/app/xplusplusai-fo-semantic-mcp.

Yours Sincerely,

Lawrence W. Sinclair
CEO/SkyDeck AI
Founder of MseeP.ai
MCP servers you can trust


MseeP.ai Security Assessment Badge

Here are our latest evaluation results of fo-semantic-mcp

Security Scan Results

Security Score: 51/100

Risk Level: high

Scan Date: 2025-10-01

Score starts at 100, deducts points for security issues, and adds points for security best practices

Detected Vulnerabilities

Medium Severity

  • cacheable-request

    • ['http-cache-semantics']
    • Fixed in version: unknown
  • got

    • [{'source': 1088948, 'name': 'got', 'dependency': 'got', 'title': 'Got allows a redirect to a UNIX socket', 'url': 'https://github.com/advisories/GHSA-pfrx-2q88-qq97', 'severity': 'moderate', 'cwe': [], 'cvss': {'score': 5.3, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}, 'range': '<11.8.5'}, 'cacheable-request']
    • Fixed in version: unknown
  • http-cache-semantics

    • [{'source': 1102456, 'name': 'http-cache-semantics', 'dependency': 'http-cache-semantics', 'title': 'http-cache-semantics vulnerable to Regular Expression Denial of Service', 'url': 'https://github.com/advisories/GHSA-rc47-6667-2j5j', 'severity': 'high', 'cwe': ['CWE-1333'], 'cvss': {'score': 7.5, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}, 'range': '<4.1.1'}]
    • Fixed in version: unknown
  • ... and 3 more medium severity vulnerabilities

Security Findings

Medium Severity Issues

  • semgrep: Use of child_process.exec() with dynamic input detected. This can lead to command injection.

    • Location: node_modules/detect-libc/lib/detect-libc.js
    • Line: 21
  • semgrep: Use of eval() detected. This can be dangerous if used with untrusted input.

    • Location: node_modules/file-type/index.js
    • Line: 972
  • ... and 3 more medium severity issues

This security assessment was conducted by MseeP.ai, an independent security validation service for MCP servers. Visit our website to learn more about our security reviews.

xplusplusai added a commit that referenced this pull request Oct 8, 2025
Major Features:
- 🎯 Golden Path Workflow: 6-step methodology for context-aware F&O development
- 🔧 Custom Code Discovery: AI now searches user's workspace for existing extensions
- 📊 Context-Aware Generation: Combines standard D365 with user's customizations
- ⚠️ Conflict Prevention: Ensures AI checks existing extensions before generating code

Enhancements:
- Complete rewrite of MCP instructions with 857-line AI-optimized document
- Visual emoji-based formatting for AI agent parsing
- ASCII workflow diagrams showing complete development process
- Structured presentation templates for clear output
- Critical warnings about common mistakes

Technical Changes:
- New instruction document: docs/MCP_instruction_doc/MCP_Tool_SearchFOArtifacts_Instructions.md
- Dynamic instruction loading with placeholder replacement
- Enhanced buildInstructions() function with fallback mechanism
- Updated README with Golden Path workflow examples
- Version bumped to 1.3.0 in package.json

Why This Matters:
Solves #1 problem - AI generating code that conflicts with existing F&O extensions.
AI now ALWAYS checks user's custom code before generating, ensuring seamless integration.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
xplusplusai added a commit that referenced this pull request Oct 8, 2025
Major Features:
- 🎯 Golden Path Workflow: 6-step methodology for context-aware F&O development
- 🔧 Custom Code Discovery: AI now searches user's workspace for existing extensions
- 📊 Context-Aware Generation: Combines standard D365 with user's customizations
- ⚠️ Conflict Prevention: Ensures AI checks existing extensions before generating code

Enhancements:
- Complete rewrite of MCP instructions with 857-line AI-optimized document
- Visual emoji-based formatting for AI agent parsing
- ASCII workflow diagrams showing complete development process
- Structured presentation templates for clear output
- Critical warnings about common mistakes

Technical Changes:
- New instruction document: docs/MCP_instruction_doc/MCP_Tool_SearchFOArtifacts_Instructions.md
- Dynamic instruction loading with placeholder replacement
- Enhanced buildInstructions() function with fallback mechanism
- Updated README with Golden Path workflow examples
- Version bumped to 1.3.0 in package.json

Why This Matters:
Solves #1 problem - AI generating code that conflicts with existing F&O extensions.
AI now ALWAYS checks user's custom code before generating, ensuring seamless integration.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant