MCP-Dandan
by 82ch·★ 63·Score 45
MCP-Dandan is a security monitoring framework that intercepts and analyzes MCP communications in real-time to detect malicious behavior.
Overview
MCP-Dandan is an integrated security solution designed to monitor MCP (Model Context Protocol) communications and detect security threats in real-time. It features a modern Electron-based desktop UI that provides an interactive dashboard for monitoring MCP traffic, analyzing threats, and controlling blocking actions. The framework includes multiple detection engines: command injection detection, file system exposure detection, PII leak detection, data exfiltration detection, and tools poisoning detection using LLM-based semantic analysis. The system supports cross-platform operation on Windows, macOS, and Linux, with customizable detection rules and a user-friendly interface for managing security alerts.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Teams implementing MCP-based AI systems that require security monitoring, particularly those concerned about malicious tool usage or data exfiltration.
When NOT to choose this
Users needing a simple MCP integration without security features, or those who cannot accept the dual Python/Node.js dependency requirement.
Tools this server exposes
5 tools extracted from the READMEdetect_command_injectionDetects potential command injection patterns in tool calls
detect_file_system_exposureMonitors unauthorized file system access attempts
detect_pii_leakDetects potential PII leakage with built-in and custom rules
detect_data_exfiltrationIdentifies suspicious data transfer patterns
analyze_tool_poisoningScores tool usage alignment with specifications to detect poisoning
Note: Tool names inferred from detection engine descriptions, as no explicit tool documentation was provided
Comparable tools
Installation
Installation
# Clone the repository
git clone https://github.com/82ch/MCP-Dandan.git
cd MCP-Dandan
# Install all dependencies (Python + Node.js)
npm run install-allRunning the Application
# Start both server and desktop UI
npm run devThe server will start on http://127.0.0.1:8282 and the Electron desktop app will launch automatically.
Claude Desktop Configuration
Add to your claude_desktop_config.json:
{
"mcpServers": {
"mcp-dandan": {
"command": "python",
"args": ["path/to/mcp-dandan/server.py"]
}
}
}FAQ
- What security threats does MCP-Dandan detect?
- MCP-Dandan detects multiple types of threats including command injection attempts, file system exposure, PII leaks, data exfiltration, and tools poisoning using LLM-based semantic analysis.
- How do I configure the Tools Poisoning Engine?
- To enable the Tools Poisoning Engine, you need to input your MISTRAL_API_KEY in the settings panel. This allows the system to compare tool specifications against actual usage and detect potential tool misuse.
Compare MCP-Dandan with
Last updated · Auto-generated from public README + GitHub signals.