Expected Findings
- MCP server accepts anonymous JSON-RPC requests over HTTP.
- `tools/list` discloses dangerous tools including shell exec and DB query.
- `resources/read` returns internal documents with no scope check.
An internal MCP server is reachable on the public internet with no auth, exposing list-tools, internal resources, and an exec tool.
["shell.exec","db.query","secrets.read","fs.write"]