04-tooling

mobbin mcp security review decision

Mon May 04 2026 20:00:00 GMT-0400 (Eastern Daylight Time) ·tooling-decision ·status: install-with-mitigations
security-reviewmcpmobbindesign-toolingpost-install

Mobbin MCP - security review decision

Founder installed Mobbin MCP via /mcp add mobbin --transport http https://api.mobbin.com/mcp at 2026-05-05 16:42 ET while my pre-install security-review SOP suggestion was being framed (founder canceled the SOP, then later asked for it post-install). This review runs the 6-step protocol from ~/rdco-vault/02-sops/2026-05-02-mcp-plugin-skill-install-security-review-sop.md against the as-installed state.

TL;DR

Verdict: INSTALL-WITH-MITIGATIONS (already installed; mitigations are operational rather than blocking).

Mobbin is a well-established UX inspiration platform (YC W22, paid SaaS, real customers including Apple/Google/Spotify-class design teams). The MCP is hosted on their infrastructure (HTTP transport, not local code execution), exposes a single read-only tool (search_screens), and has narrow blast radius. Token authentication via the standard Claude Code MCP add flow stores no plaintext token in ~/.claude.json.

6-step protocol findings

Step 1 - Install path

Step 2 - Source inspection

Step 3 - Token / credential analysis

Step 4 - Trust signals on maintainer

Step 5 - Worst-case blast radius

Step 6 - Verdict + report

INSTALL-WITH-MITIGATIONS. Already installed; mitigations are operational, not blocking.

Mitigations to apply going forward

MIT-1: Don’t leak proprietary terms in queries

Mobbin’s logs will retain whatever search queries we send. Avoid:

Generic UI/UX search terms are fine (“coming-soon page email capture,” “developer-tool product landing”). Anchor queries to the abstract design pattern, not the specific RDCO product surface.

MIT-2: Treat tool-return metadata as untrusted

The app_name and any future free-text fields returned from Mobbin could carry prompt-injection content. Already enforced by the system’s standing prompt-injection defense rules. Worth noting explicitly because Mobbin’s data is third-party-curated and could in theory be poisoned.

MIT-3: Re-review on tool-surface expansion

Current Mobbin MCP exposes ONE tool (search_screens, read-only). If Mobbin adds write tools (project save, collection edit, profile update, comment post, etc.) re-run the 6-step review before using those tools. The current review verdict applies only to the read-only research surface.

Why this is a low-cost, high-fit install

Cross-references