Skip to main content
Glama

MCP Kafka Schema Reg

MIT License
23
  • Apple
  • Linux
.trivyignore1.23 kB
# Trivy ignore file for documented security exceptions # # CVE-2023-45853: zlib integer overflow vulnerability # Status: will_not_fix by Debian maintainers # Rationale: This vulnerability affects zipOpenNewFileInZip4_6 function which is not # used in our application context. The Debian security team has marked this as # will_not_fix, indicating it's not exploitable in normal usage scenarios. # References: https://avd.aquasec.com/nvd/cve-2023-45853 CVE-2023-45853 # glibc LD_LIBRARY_PATH vulnerability # CVE-2025-4802: Base image vulnerability that doesn't affect our containerized Python application # as we don't use setuid binaries or allow dynamic library loading from user-controlled paths CVE-2025-4802 # Linux PAM vulnerabilities - System level, not exploitable in containerized Python app # CVE-2025-6020: Directory traversal - not applicable as we don't use PAM authentication CVE-2025-6020 # Perl vulnerabilities - System perl not used by our application # CVE-2023-31484: CPAN.pm TLS vulnerability - not applicable as we don't use perl/CPAN CVE-2023-31484 # Future exceptions should be added here with: # - CVE number # - Clear justification # - Mitigation measures taken # - References to upstream decisions

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/aywengo/kafka-schema-reg-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server