mcpsec vs filesystem
Side-by-side comparison to help you pick between these two MCP servers.
mcpsec by manthanghasadiya | filesystem by modelcontextprotocol | |
|---|---|---|
| Stars | ★ 22 | ★ 85,748 |
| 30d uses | — | — |
| Score | 45 | 77 |
| Official | — | ✓ |
| Categories | SecurityDeveloper ToolsOps & Infra | File SystemDeveloper ToolsProductivity |
| Language | Python | TypeScript |
| Last commit | 1 mo ago | this month |
mcpsec · Summary
A security scanner and protocol fuzzer for MCP servers that discovers runtime vulnerabilities through dynamic testing.
filesystem · Summary
A feature-rich MCP server for filesystem operations with dynamic directory access control.
mcpsec · Use cases
- Security auditing of MCP servers before deployment
- Continuous integration security checks for MCP-based applications
- Fuzz testing to discover zero-day vulnerabilities in MCP implementations
- Compliance testing for MCP server security standards
filesystem · Use cases
- Enable AI models to read and write project files during development
- Allow Claude or other MCP clients to browse and analyze codebases
- Provide secure sandboxed access to specific directories for content generation
mcpsec · Install
# Basic installation
pip install mcpsec
# With AI-powered features
pip install mcpsec[ai]
# Via Nix
nix-shell # basic
nix-shell --arg withAll true # all optional depsClaude Desktop Integration
Add to Claude Desktop's claude_desktop_config.json:
{
"mcpServers": {
"mcpsec": {
"command": "python",
"args": ["-m", "mcpsec", "stdio"]
}
}
}filesystem · Install
Installation
Using NPX
{
"mcpServers": {
"filesystem": {
"command": "npx",
"args": [
"-y",
"@modelcontextprotocol/server-filesystem",
"/path/to/allowed/directory"
]
}
}
}Using Docker
{
"mcpServers": {
"filesystem": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"--mount", "type=bind,src=/path/to/allowed/dir,dst=/projects/allowed/dir",
"mcp/filesystem",
"/projects"
]
}
}
}VS Code Extension
Click the installation buttons in the README to install directly in VS Code.