Mcp Scan
MCP Scan is a suite of tools designed to identify security vulnerabilities in Model Context Protocol (MCP) servers and connections, particularly within AI agent environments. The open-source MCP-Scan by Invariant Labs offers static and dynamic scanning capabilities, analyzing configurations from clients such as Claude and Cursor. It detects vulnerabilities including prompt injections, tool poisoning, and toxic flows, while also enforcing guardrail policies to monitor sensitive data like PII and secrets. Additionally, it supports real-time auditing of MCP traffic through a proxy mode. Other MCP Scan variants include Enkrypt AI's MCP Scan, which focuses on agentic static analysis to detect command injection, path traversal, and code injection, and mcpscan.ai, which scans MCP servers for tool poisoning and LLM-specific vulnerabilities. These tools cater to developers and teams working with MCP servers in AI agents, providing mechanisms to detect unauthorized tool changes and cross-origin escalation attacks.
MCP Scan tools provide static and dynamic security scanning for MCP servers and connections, focusing on vulnerabilities like prompt injection and tool poisoning.
Security Auditing for AI Agent MCP Servers
Developers integrate MCP Scan to statically and dynamically analyze their MCP server configurations and traffic to identify vulnerabilities before deployment.
Real-Time MCP Traffic Monitoring
Teams use the proxy mode to audit live MCP traffic, detecting prompt injections and unauthorized tool changes as they occur.
Compliance Enforcement
Organizations apply guardrail policies via MCP Scan to ensure sensitive data like PII and secrets are not leaked through MCP tool calls.
mcp-scan scan to analyze MCP configurations and connect to MCP servers.mcp-scan proxy to audit MCP traffic in real time for prompt injections and unauthorized tool changes.