Security Auditor & Trust Dashboard for MCP Servers
Scan. Score. Secure โ before your AI agent gets compromised.
MCP Shield is a CLI tool that automatically discovers your locally configured MCP (Model Context Protocol) servers, runs 8 categories of security checks, assigns a trust score (AโF), and generates beautiful reports โ all in one command.
$ mcp-shield scan
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ ๐ก๏ธ MCP Shield v1.0 โ
โ Security Auditor & Trust Dashboard โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
๐ Discovered 4 MCP servers across 3 config files
โโโโโโโโโโโโโโโโโโโโฌโโโโโโโโฌโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Server โ Score โ Grade โ Top Finding โ
โโโโโโโโโโโโโโโโโโโโผโโโโโโโโผโโโโโโโโผโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ filesystem โ 85 โ A โ SCOPE-001: broad perms โ
โ github โ 72 โ B โ ENV-002: hardcoded token โ
โ puppeteer โ 41 โ D โ NET-001: binds 0.0.0.0 โ
โ sketchy-mcp โ 18 โ F โ KNOWN-001: risky package โ
โโโโโโโโโโโโโโโโโโโโดโโโโโโโโดโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Overall Trust Score: 54 / 100 (C)
๐ก Run `mcp-shield fix <server>` for remediation steps.
MCP is the backbone of AI agent tooling in 2026 โ but most servers run with zero security review. MCP Shield changes that.
pip install mcp-shield
# Scan all auto-discovered MCP servers
mcp-shield scan
# Generate an HTML trust dashboard
mcp-shield scan --format html -o report.html
# Get remediation guidance for a specific server
mcp-shield fix filesystemThat's it. No config files, no API keys, no setup.
MCP servers are the new attack surface of the AI agent era. A single misconfigured server can:
- ๐ Leak API keys and secrets โ hardcoded tokens in env vars or command args
- ๐ Expose local services to the internet โ servers binding to
0.0.0.0without intent - ๐ Enable command injection โ shell invocations in server startup commands
- ๐ค Exfiltrate your data โ servers with both filesystem and network access
- ๐ญ Run typosquatted packages โ unscoped
npx/uvxinstalls from public registries
Most developers configure MCP servers once and never audit them again. MCP Shield gives you continuous visibility with a single command.
| Feature | Description |
|---|---|
| Auto-Discovery | Finds servers from Claude Code, Cursor, and project-level configs automatically |
| 8 Security Check Categories | 15+ individual rules across scope, command, env, package, network, exfiltration, known-risk, and privilege checks |
| Trust Scoring | 0โ100 score with AโF letter grades, per-server and overall |
| Rich CLI Output | ASCII art banners, colored tables, severity-coded findings via Rich |
| HTML Dashboard | Glassmorphism dark-theme report with animated SVG trust gauges |
| JSON Export | Machine-readable output for CI/CD pipelines |
| Guided Remediation | mcp-shield fix provides step-by-step fixes for each finding |
| Zero Config | Works out of the box โ just install and scan |
MCP Shield knows where to look. It automatically scans:
| Client | Config Paths |
|---|---|
| Claude Code | ~/.claude/settings.json, ~/.claude.json |
| Cursor | ~/.cursor/mcp.json |
| Project-level | .mcp.json, .cursor/mcp.json in current directory |
Pass --path to scan any custom config location:
mcp-shield scan --path /path/to/custom/config.json| ID | Category | Severity | What It Detects |
|---|---|---|---|
SCOPE-001 |
Scope | ๐ด High | Wildcard (*) in permission allow-lists |
SCOPE-002 |
Scope | ๐ก Medium | Missing permission allow-list entirely |
CMD-001 |
Command | ๐ด High | Shell invocation (sh -c, bash -c, cmd /c) |
CMD-002 |
Command | ๐ก Medium | Command injection risk via string interpolation |
ENV-001 |
Environment | ๐ก Medium | Sensitive env var names (*_KEY, *_SECRET, *_TOKEN) |
ENV-002 |
Environment | ๐ด High | Hardcoded secrets (API keys, tokens in plaintext) |
PKG-001 |
Package | ๐ก Medium | Unscoped npx package (typosquatting risk) |
PKG-002 |
Package | ๐ก Medium | Unscoped uvx package (typosquatting risk) |
NET-001 |
Network | ๐ด High | Server binding to 0.0.0.0 (all interfaces) |
NET-002 |
Network | ๐ก Medium | Explicit port exposure in arguments |
EXFIL-001 |
Exfiltration | ๐ด High | Combined filesystem + network access (data exfil risk) |
EXFIL-002 |
Exfiltration | ๐ก Medium | Write access to sensitive paths with outbound network |
KNOWN-001 |
Known Risk | ๐ด High | Package found in known-risky MCP server database |
PRIV-001 |
Privilege | ๐ด High | sudo in server command |
PRIV-002 |
Privilege | ๐ด High | Running as root |
PRIV-003 |
Privilege | ๐ด High | Docker --privileged flag |
mcp-shield scanmcp-shield scan --format html -o report.htmlGenerates a dark-theme glassmorphism dashboard with animated SVG trust-score gauges, per-server breakdowns, and finding details. Open report.html in any browser.
mcp-shield scan --format json
# Use in CI pipelines โ fail if overall grade is below B
mcp-shield scan --format json | jq -e '.overall_grade <= "B"'mcp-shield scan --path ~/.cursor/mcp.jsonmcp-shield fix puppeteer ๐ง Remediation for: puppeteer
NET-001 (High) โ Server binds to 0.0.0.0
โโ Risk: Exposes server to all network interfaces
โโ Fix: Change bind address to 127.0.0.1
โโ Where: args: ["--host", "0.0.0.0"] โ ["--host", "127.0.0.1"]
SCOPE-001 (High) โ Wildcard permission allow-list
โโ Risk: Server has unrestricted tool access
โโ Fix: Explicitly list only the tools you need
โโ Ref: https://modelcontextprotocol.io/docs/security
Each server receives a 0โ100 trust score based on weighted findings:
| Grade | Score | Meaning |
|---|---|---|
| A | 90โ100 | Excellent โ minimal or no issues |
| B | 80โ89 | Good โ minor issues only |
| C | 65โ79 | Fair โ moderate risks present |
| D | 50โ64 | Poor โ significant security concerns |
| F | 0โ49 | Failing โ critical risks, immediate action needed |
Scoring weights: ๐ด High findings deduct 15 pts, ๐ก Medium deduct 5 pts, ๐ต Low deduct 2 pts.
Requirements: Python 3.9+
# From PyPI (recommended)
pip install mcp-shield
# From source
git clone https://github.com/aaronagent/mcp-shield.git
cd mcp-shield
pip install -e .The only runtime dependency is rich for CLI output.
Contributions are welcome! Here's how to get involved:
- Fork the repository
- Create a feature branch (
git checkout -b feat/new-check) - Commit your changes (
git commit -m 'Add new security check') - Push to the branch (
git push origin feat/new-check) - Open a Pull Request
- ๐ New security check rules
- ๐ Support for more MCP clients (VS Code, Windsurf, etc.)
- ๐งช Test coverage
- ๐ Documentation and translations
- ๐ Bug reports and feature requests
Please see CONTRIBUTING.md for detailed guidelines.
MIT ยฉ AARON AGENT
If MCP Shield helped secure your AI agent setup, consider giving it a โญ โ it helps others discover the project.
MCP Shield ๆฏไธๆฌพๅฝไปค่กๅทฅๅ ท๏ผไธไธบ AI Agent ็ๆไธญ็ MCP๏ผๆจกๅไธไธๆๅ่ฎฎ๏ผๆๅกๅจ ๆไพๅฎๅ จๆซๆๅไฟกไปป่ฏไผฐใ
2026 ๅนด๏ผMCP ๅทฒๆไธบ AI Agent ๅทฅๅ ท้พ็ๆ ธๅฟๅ่ฎฎใ็ถ่๏ผๅคงๅคๆฐๅผๅ่ ๅจ้ ็ฝฎ MCP ๆๅกๅจๅไปๆช่ฟ่ก่ฟๅฎๅ จๅฎก่ฎกใไธไธช้่ฏฏ้ ็ฝฎ็ๆๅกๅจๅฏ่ฝๅฏผ่ด๏ผ
- ๐ API ๅฏ้ฅๅๅญๆฎๆณ้ฒ
- ๐ ๆฌๅฐๆๅกๆๅคๆด้ฒๅฐๅ ฌ็ฝ
- ๐ ๅฝไปคๆณจๅ ฅๆปๅป
- ๐ค ๆๆๆฐๆฎ่ขซ็ชๅ
- ๐ญ ๆถๆๅ ้่ฟ typosquatting ๅ ฅไพต
- ่ชๅจๅ็ฐ โ ่ชๅจๆซๆ Claude CodeใCursor ็ญๅฎขๆท็ซฏ็ MCP ้ ็ฝฎๆไปถ
- 8 ๅคง็ฑปๅฎๅ จๆฃๆฅ โ ่ฆ็ๆ้ใๅฝไปคใ็ฏๅขๅ้ใๅ ็ฎก็ใ็ฝ็ปใๆฐๆฎๅคๆณใๅทฒ็ฅ้ฃ้ฉใ็นๆๆๅ
- ไฟกไปป่ฏๅ โ 0โ100 ๅ๏ผAโF ็ญ็บง่ฏไผฐ
- ๅค็ง่พๅบๆ ผๅผ โ ๅฝฉ่ฒ็ป็ซฏ่กจๆ ผใHTML ๅฏ่งๅไปช่กจ็ใJSON๏ผๆฏๆ CI/CD ้ๆ๏ผ
- ไฟฎๅคๆๅผ โ ้ๆญฅๆๅฏผไฟฎๅคๆฏไธ้กนๅฎๅ จๅ็ฐ
pip install mcp-shield
# ๆซๆๆๆๅทฒๅ็ฐ็ MCP ๆๅกๅจ
mcp-shield scan
# ็ๆ HTML ๆฅๅ
mcp-shield scan --format html -o report.html
# ๆฅ็ไฟฎๅคๅปบ่ฎฎ
mcp-shield fix <server-name>ๆฌข่ฟๆไบค Issue ๅ Pull Request๏ผ่ฏฆ่ง CONTRIBUTING.mdใ
Built with ๐ by AARON AGENT
Securing the AI agent ecosystem, one MCP server at a time.