
MCPScan
by sahiloj·★ 22·Score 45
MCPScan is an offensive security auditor for MCP servers, detecting tool poisoning, credential leaks, RCE vectors, and supply chain vulnerabilities across stdio, HTTP, and SSE transports.
Overview
MCPScan is the first dedicated offensive security tool for MCP servers, providing comprehensive protection against known attack vectors. It implements 8 check categories covering the full MCP attack surface, including tool poisoning, credential leaks, RCE vectors, and supply chain vulnerabilities. The tool supports multiple transport protocols (stdio, HTTP, SSE) and offers various output formats including terminal, JSON, and SARIF for integration with security workflows.
Try asking AI
After installing, here are 7 things you can ask your AI assistant:
When to choose this
Choose MCPScan when you need to proactively audit MCP servers for security vulnerabilities before deployment or when integrating MCP into production systems. It's ideal for security teams and developers building MCP applications who want to identify potential risks.
When NOT to choose this
Don't choose MCPScan if you need a general-purpose security scanner for non-MCP systems or if you require protection against client-side attacks (MCPScan focuses on server-side vulnerabilities).
Tools this server exposes
2 tools extracted from the READMEscanScans MCP servers for security vulnerabilities across stdio, HTTP, and SSE transports
discoverDiscovers MCP servers without running security scans
Note: Tools inferred from CLI usage examples and command structure, as no explicit tool documentation section was found in the README.
Comparable tools
Installation
# Requires Node.js ≥ 18
git clone https://github.com/sahiloj/MCPScan.git
cd MCPScan
npm install
npm run build
# Link globally
npm link
# Run from anywhere
mcpscan --help**Claude Desktop Integration:** MCPScan automatically discovers Claude Desktop configurations at standard locations:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json - Linux:
~/.config/claude/claude_desktop_config.json - Windows:
%APPDATA%\Claude\claude_desktop_config.json
FAQ
- What types of MCP servers can MCPScan audit?
- MCPScan can audit stdio, HTTP, and SSE transport MCP servers. It can directly scan servers, scan from AI client configurations, or probe localhost ports for exposed servers.
- Can I integrate MCPScan into my CI/CD pipeline?
- Yes. MCPScan supports JSON and SARIF output formats and exits with different codes based on severity (code 2 for critical findings, code 1 for high findings) for easy integration into automated security workflows.
- How often is MCPScan updated with new vulnerability checks?
- MCPScan is actively maintained with updates based on new research and CVEs. The architecture allows for easy addition of new check modules as new attack vectors are discovered.
Compare MCPScan with
Last updated · Auto-generated from public README + GitHub signals.