MCP Catalogs
Homemcp-scan screenshot

mcp-scan

by mltrev23·0·Score 33

MCP-Scan is a security tool that statically and dynamically scans MCP connections for vulnerabilities like prompt injection and tool poisoning.

securitydeveloper-toolsmonitoring
1
Forks
0
Open issues
10 mo ago
Last commit
2d ago
Indexed

Overview

MCP-Scan operates in two main modes: static scanning of installed MCP servers for malicious tool descriptions and tools, and real-time monitoring of MCP connections through a proxy. It can detect various security threats including prompt injections, tool poisoning attacks, toxic flows, and cross-origin escalation attempts. The tool integrates with Invariant Guardrails to provide customizable security policies that can enforce data flow constraints, PII detection, and custom validation rules.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:Security auditing of MCP servers before deployment in production environments
you:Real-time monitoring of MCP traffic in development and testing environments
you:Enforcing custom security policies on MCP tool calls and responses
you:What types of vulnerabilities does MCP-Scan detect?
you:Does MCP-Scan share my data with external services?

When to choose this

Choose MCP-Scan when you need to validate MCP connections for security vulnerabilities or enforce runtime guardrails on MCP tool usage.

When NOT to choose this

Avoid if you don't want to share tool descriptions with external services (even with opt-out), or need advanced features beyond security scanning.

Tools this server exposes

4 tools extracted from the README
  • scan

    Scan MCP configurations for security vulnerabilities in tools, prompts, and resources

  • proxy

    Run a proxy server to monitor and guardrail system-wide MCP traffic in real-time

  • inspect

    Print descriptions of tools, prompts, and resources without verification

  • whitelist

    Manage the whitelist of approved entities for MCP tools, prompts, and resources

Note: Tools extracted from CLI command structure, as the README doesn't explicitly document MCP tools but rather CLI commands that would interact with MCP tools

Comparable tools

mcp-security-auditmcp-guardinvariant-gateway

Installation

Install via pip:

pip install mcp-scan

For quick usage:

uvx mcp-scan@latest scan

To use as a proxy:

mcp-scan proxy

FAQ

What types of vulnerabilities does MCP-Scan detect?
MCP-Scan detects prompt injection attacks, tool poisoning attacks, toxic flows, cross-origin escalation attacks, and MCP rug pull attacks. It can also detect and block PII and secrets in tool outputs.
Does MCP-Scan share my data with external services?
For static scanning, tool descriptions are shared with Invariant Labs for security research purposes (not your user data). You can opt out using the --opt-out flag. The proxy mode operates entirely locally without external API calls.

Compare mcp-scan with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.