F

Public audit · 2026-04-24

JetBrains/mcp-jetbrains

Overall: F (10/100) · v0.2 scan · 6 axes · LLM prompt-injection probe

SkillAudit report — JetBrains/mcp-jetbrains

Scanned 2026-04-24 by SkillAudit v0.2 (static checks + LLM-assisted prompt-injection red-team).
Commit: c8c2b85 · Stars: 949 · Days since last push: 106
LLM prompt-injection probe: no-tool-surface

Overall grade: F (10/100)

AxisScoreGrade
security10/100F
permissions100/100A
credentials70/100C⚠️
maintenance100/100A
compatibility70/100C⚠️
docs90/100A

Security findings

Production sources:

const res = await fetch(\${endpoint}/mcp/list_tools\);

const toolsResponse = await fetch(\${cachedEndpoint}/mcp/list_tools\);

const response = await fetch(\${cachedEndpoint}/mcp/${name}\, {

Permissions

_No findings on this axis._

Credentials

Production sources:

throw new Error(\Specified IDE_PORT=${process.env.IDE_PORT} but it is not responding correctly.\);

Maintenance

_No findings on this axis._

Compatibility

Production sources:

Documentation

Production sources:

missing


Methodology

SkillAudit v0.2 clones the repo at the provided ref (default: default branch, HEAD) into an ephemeral sandbox, runs six static checks over .js/.ts/.py sources, queries the GitHub API for maintenance signals, and runs an LLM-assisted prompt-injection red-team over the MCP tool surface. Each axis is scored against the rubric at .

The prompt-injection axis extracts each server.tool(...) / @app.tool registration + the first ~60 lines of handler body, hands them to Claude Haiku 4.5 with a red-team system prompt, and asks for structured findings on untrusted-content flow into tool responses. One API call per scan, bounded at ~15K input tokens.

How to improve this grade

_Report generated by skillaudit.dev_

Want your repo audited?

First 100 audits go to waitlist signups in order. The engine runs against public GitHub URLs today.

Join the waitlist →