Security infrastructure for the agent economy
A CLI scanner purpose-built for Model Context Protocol servers. Detects vulnerabilities, misconfigurations, and compliance gaps in seconds.
No account required. MIT licensed. Read the docs →
mcp-scan ships with a rule library built against the MCP specification — tool poisoning, prompt injection via tool descriptions, transport security, capability escalation. Generic SAST tools miss these. We don't.
No generic scanner has MCP-specific rules. The attack surfaces in this protocol don't exist in traditional web security tooling.
npx @syntrophy/mcp-scan scan <target> — that's it. Run locally, in your CI pipeline, or in a pre-commit hook. Results in seconds. JSON and SARIF output for downstream tooling.
# Add to any CI pipeline - name: mcp-scan security check run: npx @syntrophy/mcp-scan scan ./src/mcp-server
No vague "potential vulnerability detected" noise. mcp-scan returns the vulnerable code path, severity classification, rule ID, and a remediation path. Fix it. Move on.
Pricing
Full CLI access — free while we're in development. Join the beta list to get notified about Pro features, rule updates, and the CI integration.
No spam. Unsubscribe any time. We announce rule updates and version releases only.
FAQ
Does mcp-scan require an account?
No. npx @syntrophy/mcp-scan scan <target> runs locally with no signup, no API key, no telemetry by default.
What MCP spec versions does it support?
mcp-scan tests against the current MCP specification. The rule library is updated as the spec evolves — check --version for the current rule count.
Can I run it in CI?
Yes. JSON output and SARIF 2.1.0 output work with GitHub Advanced Security, GitLab, and any SIEM with SARIF ingestion. --format sarif --output report.sarif
Is the rule library open source?
The CLI and community rule library are MIT licensed. Advanced rules (enterprise detection patterns, custom rule authoring) are planned for Pro.
What languages and frameworks does it support?
mcp-scan analyzes MCP server implementations in TypeScript and JavaScript. Python support is on the roadmap. File a GitHub issue if your runtime is blocking adoption.
How is this different from Snyk or Semgrep?
Snyk and Semgrep have no MCP-specific rules. They don't know the MCP spec. They won't catch tool poisoning, prompt injection via tool descriptions, or capability escalation. mcp-scan was built for exactly these attack surfaces.