The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Missing Encryption of Sensitive Data vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/stacklok/toolhive/cmd/thv/app
to version 0.0.33 or higher.
Affected versions of this package are vulnerable to Missing Encryption of Sensitive Data due to the ordering of code used to start an MCP server container. An attacker can read secrets without needing access to the secrets store itself by gaining access to the home folder of the user who starts the MCP server. This is only exploitable if secrets were used in containers whose run configs exist at a point in time - other secrets remaining inaccessible.
This vulnerability can be mitigated by stopping and deleting any running MCP servers, or manually removing any runconfigs from $HOME/Library/Application Support/toolhive/runconfigs/
(macOS) or $HOME/.state/toolhive/runconfigs/
(Linux).