Searxng Web

PassAudited by VirusTotal on May 12, 2026.

Overview

Package: searxng-web (mcp) Version: Description: web search via local searxng (no brave api key). provides searxng_search(query, count). The `searxng-web` package provides a Node.js tool (`searxng_search`) designed to proxy web search queries to a locally hosted SearXNG instance. The tool constructs a URL targeting `http://host.docker.internal:8081/search` with the user-provided query and a `format=json` parameter. It fetches the JSON response, normalizes the results (title, URL, snippet, source), and outputs them to stdout. Input parameters (`query`, `count`) are validated, with `count` capped between 1 and 10. The hardcoded internal Docker host address (`host.docker.internal`) is a key security control, preventing arbitrary external network requests and significantly mitigating Server-Side Request Forgery (SSRF) risks. The code logic is straightforward, performs standard HTTP requests, and does not exhibit any apparent vulnerabilities for arbitrary code execution, command injection, or data exfiltration.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Search terms, including any sensitive text placed in a query, will be sent to the configured local SearxNG instance.

Why it was flagged

The tool transmits the user's search query to a local SearxNG HTTP endpoint. This is disclosed and purpose-aligned, but users should understand that queries leave the agent process and go to that local service.

Skill content
const u=new URL("http://host.docker.internal:8081/search");u.searchParams.set("q",query);u.searchParams.set("format","json");
Recommendation

Use this only with a trusted local SearxNG instance and avoid putting secrets or private data into search queries.