Conversation
Reviewer's GuideThis PR integrates the new Trust Score badge into the project’s README to surface transparent quality metrics, while also regenerating the dependency lockfile and introducing a set of duplicated documentation and configuration artifacts (suffixed with “2”) likely stemming from an automated file generation process. Flow diagram for Trust Score badge rendering and navigationflowchart TD
A[User opens README.md]
B[Trust Score badge loads from MCP Catalog API]
C[User clicks badge]
D[User navigates to MCP Catalog project page]
A --> B
B --> C
C --> D
File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Hey there - I've reviewed your changes - here's some feedback:
Blocking issues:
- Discovered a potential authorization token provided in a curl command header, which could compromise the curl accessed resource. (link)
General comments:
- This PR includes hundreds of unrelated files (lockfile, docs, changelogs) that obscure the small badge change—please trim the diff to only the README badge insertion.
- The badge URL uses uppercase “VeriTeknik” which may not match your catalog slug; ensure the casing matches the actual identifier (usually all lowercase) to avoid broken links.
Prompt for AI Agents
Please address the comments from this code review:
## Overall Comments
- This PR includes hundreds of unrelated files (lockfile, docs, changelogs) that obscure the small badge change—please trim the diff to only the README badge insertion.
- The badge URL uses uppercase “VeriTeknik” which may not match your catalog slug; ensure the casing matches the actual identifier (usually all lowercase) to avoid broken links.
## Security Issues
### Issue 1
<location> `README 2.md:330` </location>
<issue_to_address>
**security (curl-auth-header):** Discovered a potential authorization token provided in a curl command header, which could compromise the curl accessed resource.
*Source: gitleaks*
</issue_to_address>Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
README 2.md
Outdated
| curl -X POST http://localhost:12006/mcp \ | ||
| -H "Authorization: Bearer YOUR_API_KEY" \ |
There was a problem hiding this comment.
security (curl-auth-header): Discovered a potential authorization token provided in a curl command header, which could compromise the curl accessed resource.
Source: gitleaks
|
Hey @Matvey-Kuk Congrats on your seed round. Hope you succeed. Best, |
Cleaned up files with ' 2' suffix that were accidentally added
|
@ckaraca thank you, and apologies! Fixed the PR. |
Hi!
This PR adds the "Trust Score" badge from our new Open Source MCP catalog.
Our catalog evaluates MCP servers based on technical quality—like protocol feature implementation and dependency health—rather than vanity metrics like GitHub stars.
The scoring process is fully transparent and reproducible:
The badge is designed to be respectful to the structure of your readme, example:
Projects like Grafana MCP (https://github.com/grafana/mcp-grafana) are already participating.
We believe that transparent and truly open source MCP catalog should help the community to identify great MCP servers like yours 😊
We'd appreciate your support by merging this PR!
Summary by Sourcery
Add a transparent Trust Score badge to the project README and commit a pnpm lockfile to ensure consistent dependency installs.
New Features:
Enhancements:
Documentation: