mcp-armor

mcp
SUMMARY

MCP Armor continuously secures and monitors Model Context Protocol operations through static and dynamic scans, revealing hidden risks in agent-to-tool communications.

README.md

MCP Armor


๐Ÿš€ Overview

MCP Armor is a comprehensive security scanner for Model Context Protocol (MCP). Automatically discovers, analyzes, and secures MCP servers integrated with all major Agentic IDEs, Agents and Clients.


MCP Armor

๐Ÿ’ก Features

  • ๐Ÿ” Auto-Discovery: Finds known MCP configurations for popular Agentic IDEs like Cursor, Windsurf, VS Code, Claude Desktop, and more
  • ๐Ÿ”ง Tool, Resource & Prompt Inventory: Connects to MCP servers and catalogs available tools, resources, and prompt templates
  • ๐Ÿ›ก๏ธ Security Analysis: Specialized security checks including Prompt Injection, Rug Pull Attack, Cross-server Tool Shadowing, Tool Poisoning, Tool Name Ambiguity, and more..
  • ๐Ÿงญ Baseline Drift Detection: Captures approved MCP components and detects rug pulls attacks
  • ๐Ÿ“Š Comprehensive Reporting: Generates JSON and Markdown reports with actionable findings
  • ๐Ÿ“œ Audit Trail: Timestamped baselines and reports for full traceability of changes and findings

๐Ÿงฐ Installation

pip install mcp-armor

๐Ÿƒ Quick Start

# Scan all configurations with security analysis (auto-detects baseline.json if present)
mcp-armor scan

# Inspect configurations and generate baseline (defaults to baseline.json)
mcp-armor inspect

# Use custom configuration file
mcp-armor scan --config /path/to/config.json

# Scan multiple configuration files
 mcp-armor scan \
   --config /path/to/cursor.mcp.json \
   --config /path/to/vscode.mcp.json

# Use custom baseline file path
mcp-armor inspect --baseline /path/to/my-baseline.json
mcp-armor scan --baseline /path/to/my-baseline.json

# Generate markdown report
mcp-armor scan --report-type md

# Save to custom file
mcp-armor scan --output my-report.json
mcp-armor scan --report-type md --output my-report.md

โš™๏ธ Command Options

Option Description
--config Custom configuration file path (can be used multiple times)
--baseline Baseline file for drift detection (scan) or creation (inspect)
--report-type {json,md} Output format (default: json)
--output Custom output file path
--verbose Detailed terminal output
--show-logs Display debug logs in terminal

๐Ÿ”ฐ Security Checks

๐Ÿ›ก๏ธ Standard Checks

  • Prompt Injection
  • Indirect Prompt Injection
  • Cross-Server Tool Shadowing
  • Tool Poisoning
    • Prompt Injection in Tool Description, Name and Args
    • Command Injection in Tool Description, Name and Args
  • Tool Name Ambiguity
  • Command Injection
  • Excessive Tool Permissions
  • Hardcoded Secrets

๐Ÿงญ Baseline Checks

Detects deviations from approved MCP components (requires a baseline generated via inspect mode):

  • Rug Pull Attack
    • Tool Modified
    • Resource Modified
    • Resource Template Modified
    • Prompt Modified

๐Ÿ“ƒ Logging

Logs are automatically saved to logs/mcp_armor.log:

# Default: logs saved to file only
mcp-armor scan

# Show logs in terminal too
mcp-armor scan --show-logs

๐Ÿงช Demo

Test MCP Armor using our intentionally vulnerable MCP servers. For details, see the demo guide.

โšก Want More?

This open-source version covers static MCP configuration scanning. For teams that need deeper protection, Aira Security offers a full enterprise platform with:

Capability Open Source Aira Platform
MCP config scanning โœ… โœ…
Prompt & command injection detection โœ… โœ…
Tool poisoning & shadowing checks โœ… โœ…
Hardcoded secrets detection โœ… โœ…
Runtime enforcement & blocking โŒ โœ…
Agent behavior policy enforcement (toxic flow analysis) โŒ โœ…
Skills scanner (agentic workflow & capability analysis) โŒ โœ…
Custom security policies โŒ โœ…
Aira dashboard (centralized visibility & alerting) โŒ โœ…
Complete Agentic Security (beyond MCP โ€” Agents, Workflows, and Skills) โŒ โœ…

๐Ÿš€ See Aira in Action to experience the full platform.

๐ŸŒŸ Community

Join our Slack - a space for developers and security engineers building together to secure AI agents.

โ“ FAQs

Q: Is my source code ever shared, or does everything run locally?

MCP Armor runs entirely locally. Inspect and scan modes analyze your MCP configurations, detect MCP servers integrated with your agents, and evaluate them directly on your machine. Prompt injection checks use our open-source model Aira-security/FT-Llama-Prompt-Guard-2, downloaded from Hugging Face to your local environment, ensuring your data and code is never shared externally.

โš–๏ธ License

Distributed under the Apache 2.0 License. See LICENSE for more information.

Yorumlar (0)

Sonuc bulunamadi