MCP ExplorerExplorer

Mcpsafetyscanner

@johnhalloran321on 25 days ago
73 MPL-2.0
FreeCommunity
AI Systems
MCPSafetyScanner - Automated MCP safety auditing and remediation using Agents. More info: https://www.arxiv.org/abs/2504.03767

Overview

What is Mcpsafetyscanner

mcpSafetyScanner is an automated safety auditing tool designed for Model Context Protocol (MCP) servers. It utilizes multiple agents to analyze server configurations and generate safety reports to help developers patch vulnerabilities and enhance system security.

Use cases

Use cases for mcpSafetyScanner include auditing MCP server configurations for security vulnerabilities, generating reports for developers to address potential exploits, and providing users with actionable insights to secure their systems against unauthorized access.

How to use

To use mcpSafetyScanner, clone the repository from GitHub, install the required dependencies, and run the scanning script with your MCP server configuration file. Set your OpenAI API key as an environment variable before executing the scan.

Key features

Key features of mcpSafetyScanner include automated safety audits, detailed safety reports highlighting potential vulnerabilities, and recommendations for hardening server configurations. It also provides examples and troubleshooting guidance for users.

Where to use

mcpSafetyScanner is primarily used in environments where MCP servers are deployed, such as in research institutions, software development companies, and any organization utilizing machine learning models that require secure configurations.

Content

MCPSafetyScanner

MCPSafetyScanner

MCP Safety Audit: LLMs with the Model Context Protocol Allow Major Security Exploits
Brandon Radosevich*, John Halloran*
Paper: https://www.arxiv.org/abs/2504.03767

About

MCPSafetyScanner is a safety auditor for Model Contenxt Protocol (MCP) servers. Point it at your MCP server config file and the software will use multiple agents
to audit your setup and produce a safety report. Developers can use this info to patch exploits and users can use this info to harden their system.

Claude Desktop Users can find their MCP server config files at:

  • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
  • Windows: %APPDATA%\Claude\claude_desktop_config.json

Installation

git clone https://github.com/johnhalloran321/mcpSafetyScanner
cd mcpSafetyScanner
python -m pip install -e .

Example use

An example MCP config is supplied in the examples of the repo. After updating the relevant directories and access credentials, you can perform a safety audit with the installed software by running:

export OPENAI_API_KEY="YOUR_API_KEY"
python3 mcpsafety/scanner/scan.py --config examples/example_config.json

Example scan, part a
Example scan, part b

The report would thus alert developers to screen for ~/.ssh/authorized_keys and *.pem files, while also placing direct guardrails around printing environment variables with sensitive information (e.g., api keys). The report would thus alert users to be cautious of providing paths containing .ssh/authorized_keys or *.pem files, and, alternatively, restrict user write permissions to such files.

Troubleshooting

The software requires python >= 3.11.

If using conda and npx is not installed, run

conda install conda-forge::nodejs

Citation

If you use this code in your research, please cite:

@article{radosevich2025mcp,
  title={MCP Safety Audit: LLMs with the Model Context Protocol Allow Major Security Exploits},
  author={Radosevich, Brandon and Halloran, John},
  journal={arXiv preprint arXiv:2504.03767},
  year={2025}
}

Tools

No tools

Comments

Recommend MCP Servers

View All MCP Servers