Free, zero-friction CLI that audits MCP servers for memory poisoning vulnerabilities in <30 seconds.
πΊπΈ US-based security platform β’ Enterprise-grade protection for AI agents
"We Audited 50 Public MCP Servers. 94% Are Critically Vulnerable to Memory Poisoning."
npx @deepsweepai/auditor audit --demoThe Problem: AI agents with memory (MCP servers) can be poisoned with malicious instructions that persist across sessions, bypass security controls, and compromise entire systems.
The Solution: Run DeepSweep.ai Auditor in <30 seconds to get undeniable proof of vulnerabilities with actionable reports you can forward to security teams.
npx @deepsweepai/auditor audit --demoThis runs against a known-vulnerable MCP server and shows you exactly what vulnerabilities look like.
# Remote MCP server
npx @deepsweepai/auditor audit --url http://localhost:8000
# WebSocket MCP server
npx @deepsweepai/auditor audit --url ws://localhost:8000
# Session replay file
npx @deepsweepai/auditor audit --file session.json
# Auto-detect local MCP servers
npx @deepsweepai/auditor audit --dockernpx @deepsweepai/auditor audit --url https://mcp.example.com --api-key YOUR_KEY
npx @deepsweepai/auditor audit --url https://mcp.example.com --bearer-token YOUR_TOKENRun audits without any network calls (perfect for air-gapped environments):
# Offline demo mode
npx @deepsweepai/auditor audit --offline --demo
# Offline with session file
npx @deepsweepai/auditor audit --offline --file session.jsonOffline mode:
- β No telemetry or analytics
- β No external API calls
- β Works in air-gapped environments
- β All detection runs locally
- β Cannot use
--url,--docker, or--share
1. Run Audit (30 seconds)
npx @deepsweepai/auditor audit --demo2. View Detailed Report
- Open
audit-report.htmlin your browser - Review findings, risk scores, and compliance status
- Forward to security teams or CISOs
3. Get Continuous Protection (Recommended for Critical/High Risk)
- Visit DeepSweep Platform
- Create your account and get started
- Deploy real-time memory firewall across all AI agents
4. Dashboard Integration (Optional)
- Get API key from Platform Dashboard
- Set
DEEPSWEEP_API_KEYenvironment variable - View audit history, team collaboration, custom policies
All security detection runs locally. No API key required for audits.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
DeepSweep.ai Auditor v0.1.0 - MCP Security Audit
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Server: http://localhost:8000
Audit ID: audit_1732219801000_a1b2c3d4e5f6g7h8
Timestamp: 11/21/2025, 2:30:01 PM
Overall Risk: CRITICAL
Risk Score: 89/100
Findings Summary:
Total Findings: 14
Critical: 3
High: 5
Medium: 4
Low: 2
Threat Detection:
Memory Poisoning: DETECTED
Tool Poisoning: DETECTED
Compliance Status:
NIST AI RMF: β FAIL
ISO 42001: β PARTIAL
SOC2 AI: β FAIL
EU AI Act: β FAIL
Critical Findings:
1. Recursive/Self-Referencing Instructions Detected
Memory contains instructions that attempt to override system behavior
2. Known Malicious Signature: DAN (Do Anything Now) Jailbreak
Memory contains a known malicious pattern used in attacks
3. Tool with Dangerous Permission: Shell Access
Tool "execute_command" has overly broad permissions
Recommendations:
1. Immediate: Address 3 critical security vulnerabilities
2. Immediate: Implement input validation for all memory writes
3. Immediate: Restrict tool permissions to principle of least privilege
4. Deploy DeepSweep.ai Memory Firewall β https://deepsweep.ai
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Prevent these attacks automatically β https://deepsweep.ai
βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
π JSON report saved: ./risk_score.json
π HTML report saved: ./audit-report.html
- Recursive Instructions - "Ignore previous instructions" patterns
- Persistent Overrides - Instructions designed to survive sessions
- Encoded Injections - Base64, hex, URL-encoded malicious content
- Malicious Signatures - Known jailbreaks (DAN, sudo mode, etc.)
- Entropy Anomalies - Encrypted or obfuscated content
- Goal Drift - Instructions that deviate from system objectives
- Broad Permissions - Tools with excessive or dangerous access
- Runtime Additions - Tools added mid-session without approval
- Suspicious Parameters - Shell commands, path traversal, injection patterns
- NIST AI RMF 1.0 - Govern, Map, Measure, Manage
- ISO/IEC 42001 - AI Management System
- SOC 2 Trust Services - Security, Integrity, Confidentiality
- EU AI Act - High-Risk AI System Requirements
Machine-readable report for CI/CD integration:
{
"audit_id": "audit_1732219801000_a1b2c3d4",
"version": "0.1.0",
"timestamp": "2025-11-21T14:30:01Z",
"overall_risk": "CRITICAL",
"risk_score_0_100": 89,
"findings_count": 14,
"critical_findings": 3,
"compliance": {
"nist_ai_rmf": "FAIL",
"iso_42001": "PARTIAL",
"eu_ai_act_high_risk": "FAIL"
}
}Beautiful, shareable report for security teams:
npx @deepsweepai/auditor audit --url http://localhost:8000 --htmlProfessional audit report for compliance:
npx @deepsweepai/auditor audit --url http://localhost:8000 --pdfUpload anonymized report and get shareable link:
npx @deepsweepai/auditor audit --url http://localhost:8000 --share
# β
Report shared: https://deepsweep.ai/share/audit_1732219801000deepsweepai audit [options] # Audit an MCP server
# or use the alias:
dsauditor audit [options]Connection:
--url <url>- MCP server URL (http:// or ws://)--file <path>- Session replay JSON file--docker- Auto-detect local Docker MCP servers--api-key <key>- API key for authentication--bearer-token <token>- Bearer token for authentication
Output:
--json- Generate JSON report (risk_score.json)--html- Generate HTML report (audit-report.html)--pdf- Generate PDF report (audit-report.pdf)--output <dir>- Output directory (default: current)
Other:
--share- Share anonymized report to deepsweep.ai--demo- Run demo mode with vulnerable MCP server--no-telemetry- Disable anonymous telemetry--offline- Run in offline mode (no network calls, implies --no-telemetry)
0- No critical vulnerabilities found1- Critical vulnerabilities detected or error occurred
name: MCP Security Audit
on: [push, pull_request]
jobs:
audit:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Start MCP Server
run: docker-compose up -d mcp-server
- name: Run DeepSweep.ai Audit
run: npx @deepsweepai/auditor audit --url http://localhost:8000 --json
- name: Upload Report
uses: actions/upload-artifact@v3
with:
name: security-report
path: risk_score.jsonnpx @deepsweepai/auditor audit --url http://localhost:8000
# Exit code 1 if critical findings detectedAll security detection runs locally on your machine. The auditor works perfectly without any API key.
β Memory Poisoning Detection - Recursive patterns, semantic drift, malicious signatures β PII Leakage Detection - Emails, SSNs, credit cards, API keys β Prompt Injection Patterns - Jailbreaks, instruction overrides β Tool Poisoning - Suspicious parameters, broad permissions β Compliance Mapping - NIST AI RMF, ISO 42001, SOC 2, EU AI Act β Risk Scoring - 0-100 severity scores with actionable recommendations
All detection logic is built into the CLI. No API calls required for security analysis.
Tier 1: Anonymous Telemetry (Default)
- π Device ID: Generated UUID stored in
~/.deepsweep/device-id - π Collected: Risk scores, finding counts, compliance metrics, timestamps
- β Never collected: MCP server URLs, prompts, memory content, PII, source code
- π Security: Encrypted HTTPS to
api.deepsweep.ai/v1/events/anonymous - πͺ Opt-out:
--no-telemetryorDEEPSWEEP_TELEMETRY=off
Tier 2: Dashboard Integration (Optional - Requires API Key)
- π Audit History: Store audit results in DeepSweep dashboard
- π₯ Team Collaboration: Share findings across your organization
- π Custom Policies: Load project-specific rules from dashboard
- π Integrations: Auto-create tickets, Slack alerts, CI/CD hooks
Important: The API key unlocks dashboard features, not detection features. All security analysis happens locally.
-
Get your API key from the DeepSweep Platform
-
Set the API key as an environment variable:
export DEEPSWEEP_API_KEY=ds_prod_a1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p6- Run the auditor (dashboard integration activates automatically):
npx @deepsweepai/auditor audit --demo
# β Same local detection + results stored in dashboard
# β π View audit in DeepSweep Platform: https://platform.deepsweep.ai/audits/abc123API Key Formats:
- Production:
ds_prod_* - Business:
ds_biz_* - Free tier:
ds_free_*
Environment Variables:
DEEPSWEEP_API_KEY- Your DeepSweep API key (optional, for dashboard features)DEEPSWEEP_API_URL- API base URL (default:https://api.deepsweep.ai/v1)DEEPSWEEP_TELEMETRY- Set toofforfalseto disable anonymous telemetry
Device ID Storage:
- Location:
~/.deepsweep/device-id - Format: UUID v4 (e.g.,
550e8400-e29b-41d4-a716-446655440000) - Purpose: Anonymous usage tracking (no PII)
βββββββββββββββββββ
β MCP Server β
β (Your Agent) β
ββββββββββ¬βββββββββ
β
βΌ
βββββββββββββββββββ ββββββββββββββββββββ
β Connectors ββββββΆβ Detectors β
β HTTP/WS/File β β Memory + Tool β
βββββββββββββββββββ ββββββββββ¬ββββββββββ
β
βΌ
ββββββββββββββββββββ
β Compliance β
β NIST/ISO/SOC2/EU β
ββββββββββ¬ββββββββββ
β
βΌ
ββββββββββββββββββββ
β Reporters β
β JSON/HTML/PDF β
ββββββββββββββββββββ
TL;DR: We built a free CLI tool that finds memory poisoning in MCP servers in <30 seconds. Try it now:
npx @deepsweepai/auditor audit --demoThe Problem:
AI agents with memory (Model Context Protocol servers) are the future of AI applications. But they're also the future of AI vulnerabilities.
We discovered that 94% of public MCP servers are vulnerable to memory poisoning attacks where malicious instructions persist across sessions, bypass guardrails, and compromise the entire agent.
The Solution:
DeepSweep.ai Auditor is a free, open-source CLI that audits any MCP server in <30 seconds and generates reports you can forward to your CISO.
Key Features:
- β
Zero friction - Works with
npx, no installation - β <30 second scans
- β 9 detectors (6 memory + 3 tool poisoning)
- β Compliance mapping (NIST, ISO, SOC2, EU AI Act)
- β Beautiful reports (JSON, HTML, PDF)
- β Anonymous telemetry only
- β MIT licensed
Try it now:
npx @deepsweepai/auditor audit --demoShare your results:
Found vulnerabilities? Share on Twitter/LinkedIn with --share and tag @deepsweepai
Prevent attacks automatically:
DeepSweep.ai Memory Firewall provides real-time protection β https://deepsweep.ai
Contributions welcome! See CONTRIBUTING.md
MIT License - see LICENSE
- Homepage: https://deepsweep.ai
- Repository: https://github.com/deepsweep-ai/auditor
- Issues: https://github.com/deepsweep-ai/auditor/issues
- NPM: @deepsweepai/auditor
- Discord: Join Community
DeepSweep.ai Auditor β Because AI agents shouldn't be deployed without security testing.
Launch November 28, 2025. π