Hyperterse: Raw exposure of database statements in MCP search tool
Moderate severity
GitHub Reviewed
Published
Mar 12, 2026
in
hyperterse/hyperterse
•
Updated Mar 12, 2026
Description
Published by the National Vulnerability Database
Mar 12, 2026
Published to the GitHub Advisory Database
Mar 12, 2026
Reviewed
Mar 12, 2026
Last updated
Mar 12, 2026
Hyperterse allows users to specify database queries for tools to execute under the hood. As of v2.0.0, there are only two tools exposed -
searchandexecute.The
searchtool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly.This issue has been fixed as of v2.2.0 and relevant tests to catch these have been added.
References