The article discusses a critical Remote Code Execution (RCE) vulnerability, named TARmageddon (CVE-2025-62518), found in the async-tar Rust library and its forks, including the abandoned tokio-tar. This vulnerability can lead to severe attacks due to its wide usage in popular projects, highlighting the challenges of maintaining open-source software and coordinating timely disclosures and patches across multiple forks. The Edera team recommends migrating to actively maintained forks to mitigate risks associated with the abandoned dependencies.
The MCP Scanner is a Python tool developed by Cisco AI Defense for scanning Model Context Protocol (MCP) servers to identify potential security vulnerabilities. It utilizes multiple scanning engines, including YARA rules and the Cisco AI Defense inspect API, allowing for flexible authentication and customization options. The tool can be run as a CLI or REST API, providing comprehensive vulnerability reporting and easy integration with MCP servers.