Track MCP LogoTrack MCP
Track MCP LogoTrack MCP

The world's largest repository of Model Context Protocol servers. Discover, explore, and submit MCP tools.

Product

  • Categories
  • Top MCP
  • New & Updated
  • Submit MCP

Company

  • About

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

© 2026 TrackMCP. All rights reserved.

Built with ❤️ by Krishna Goyal

    Mcp Scan

    Constrain, log and scan your MCP connections for security vulnerabilities. Python-based implementation. Trusted by 1200+ developers.

    1,239 stars
    Python
    Updated Nov 4, 2025
    agent
    ai
    mcp
    modelcontextprotocol
    security

    Table of Contents

    • Highlights
    • Quick Start
    • Scanning
    • Example Run
    • Scanner Capabilities
    • How It Works
    • Scanning
    • CLI Parameters
    • Common Options
    • Commands
    • scan (default)
    • inspect
    • help
    • Examples
    • Demo
    • Agent Scan is closed to contributions
    • Development Setup
    • Including Agent Scan results in your own project / registry
    • Documentation
    • Further Reading
    • Changelog

    Table of Contents

    • Highlights
    • Quick Start
    • Scanning
    • Example Run
    • Scanner Capabilities
    • How It Works
    • Scanning
    • CLI Parameters
    • Common Options
    • Commands
    • scan (default)
    • inspect
    • help
    • Examples
    • Demo
    • Agent Scan is closed to contributions
    • Development Setup
    • Including Agent Scan results in your own project / registry
    • Documentation
    • Further Reading
    • Changelog

    Documentation

    Snyk Agent Scan

    Discover and scan agent components on your machine for prompt injections

    and vulnerabilities (including agents, MCP servers, skills).

    NEW Read our technical report on the emerging threats of the agent skill eco-system published together with Agent Scan 0.4, which adds support for scanning agent skills.

    Agent Scan helps you keep an inventory of all your installed agent components (harnesses, MCP servers, skills) and scans them for common threats like prompt injections, sensitive data handling, or malware payloads hidden in natural language.

    Highlights

    • Auto-discover MCP configurations, agent tools, skills
    • Scanning of Claude, Cursor, Windsurf, Gemini CLI, and other agents.
    • Detects 15+ distinct security risks across MCP servers and agent skills:
    • MCP: Prompt Injection, Tool Poisoning, Tool Shadowing, Toxic Flows
    • Skills: Prompt Injection, Malware Payloads, Untrusted Content, Credential Handling, Hardcoded Secrets

    Quick Start

    To get started:

    1. **Sign up at Snyk** and get an API token from https://app.snyk.io/account (API Token → KEY → click to show).

    2. Set the token as an environment variable before running any scan:

    bash
    export SNYK_TOKEN=your-api-token-here

    3. Have uv installed on your system.

    Scanning

    To run a full scan of your machine (auto-discovers agents, MCP servers, skills), run:

    bash
    uvx snyk-agent-scan@latest

    This will scan for security vulnerabilities in servers, skills, tools, prompts, and resources. It will automatically discover a variety of agent configurations, including Claude Code/Desktop, Cursor, Gemini CLI, and Windsurf.

    You can also scan particular configuration files or skills:

    bash
    # scan mcp configurations
    uvx snyk-agent-scan@latest ~/.vscode/mcp.json
    # scan a single agent skill
    uvx snyk-agent-scan@latest ~/path/to/my/SKILL.md
    # scan all claude skills
    uvx snyk-agent-scan@latest ~/.claude/skills

    Example Run

    Agent Scan security vulnerabilities demo

    Scanner Capabilities

    Agent Scan is a security scanning tool to both scan and inspect the supply chain of agent components on your machine. It scans for common security vulnerabilities like prompt injections, tool poisoning, toxic flows, or vulnerabilities in agent skills.

    Agent Scan operates in two main modes which can be used jointly or separately:

    1. Scan Mode: The CLI command snyk-agent-scan scans the current machine for agents and agent components such as skills and MCP servers. Upon completion, it will output a comprehensive report for the user to review.

    2. Background Mode (MDM, Crowdstrike). Agent Scan scans the machine in regular intervals in the background, and reports the results to a Snyk Evo instance. This can be used by security teams to monitor the company-wide agent supply chain in a central location. To set this up, please contact us.

    How It Works

    Scanning

    Agent Scan searches through your local agent's configuration files to find agents, skills, and MCP servers. For MCP, it connects to servers and retrieves tool descriptions.

    It then validates the components, both with local checks and by invoking the Agent Scan API. For this, skills, agent applications, tool names, and descriptions are shared with Snyk. By using Agent Scan, you agree to the Snyk terms of use for Agent Scan.

    A unique, persistent, and anonymous ID is assigned to your scans for analysis. You can opt out of sending this information using the --opt-out flag.

    Agent Scan does not store or log any usage data, i.e. the contents and results of your MCP tool calls.

    CLI Parameters

    Agent Scan provides the following commands:

    code
    snyk-agent-scan - Security scanner for agents, MCP servers, and skills

    Common Options

    These options are available for all commands:

    code
    --storage-file FILE    Path to store scan results and scanner state (default: ~/.mcp-scan)
    --base-url URL         Base URL for the verification server
    --verbose              Enable detailed logging output
    --print-errors         Show error details and tracebacks
    --json                 Output results in JSON format instead of rich text

    Commands

    scan (default)

    Scan MCP configurations for security vulnerabilities in tools, prompts, and resources.

    code
    snyk-agent-scan scan [CONFIG_FILE...]

    Options:

    code
    --checks-per-server NUM           Number of checks to perform on each server (default: 1)
    --server-timeout SECONDS          Seconds to wait before timing out server connections (default: 10)
    --suppress-mcpserver-io BOOL      Suppress stdout/stderr from MCP servers (default: True)

    inspect

    Print descriptions of tools, prompts, and resources without verification.

    code
    snyk-agent-scan inspect [CONFIG_FILE...]

    Options:

    code
    --server-timeout SECONDS      Seconds to wait before timing out server connections (default: 10)
    --suppress-mcpserver-io BOOL  Suppress stdout/stderr from MCP servers (default: True)

    help

    Display detailed help information and examples.

    bash
    snyk-agent-scan help

    Examples

    bash
    # Scan all known MCP configs
    snyk-agent-scan
    
    # Scan a specific config file
    snyk-agent-scan ~/custom/config.json
    
    # Just inspect tools without verification
    snyk-agent-scan inspect

    Demo

    This repository includes a vulnerable MCP server that can demonstrate Model Context Protocol security issues that Agent Scan finds.

    How to demo MCP security issues?

    1. Clone this repository

    2. Create an mcp.json config file in the cloned git repository root directory with the following contents:

    jsonc
    {
      "mcpServers": {
        "Demo MCP Server": {
          "type": "stdio",
          "command": "uv",
          "args": ["run", "mcp", "run", "demoserver/server.py"],
        },
      },
    }

    3. Run Agent Scan: uvx --python 3.13 snyk-agent-scan@latest scan --full-toxic-flows mcp.json

    Note: if you place the mcp.json configuration filepath elsewhere then adjust the args path inside the MCP server configuration to reflect the path to the MCP Server (demoserver/server.py) as well as the uvx command that runs Agent Scan with the correct filepath to mcp.json.

    Agent Scan is closed to contributions

    Agent Scan does not accept external contributions at this time.

    We welcome suggestions, bug reports, or feature requests as GitHub issues.

    Development Setup

    To run Agent Scan from source, follow these steps:

    bash
    uv run pip install -e .
    uv run -m src.agent_scan.cli

    Including Agent Scan results in your own project / registry

    If you want to include Agent Scan results in your own project or registry, please reach out. There are designated APIs for this purpose. Using the standard Agent Scan API for large scale scanning is considered abuse and will result in your account being blocked.

    Documentation

    • Scanning — How scanning works, CLI parameters, and usage examples.
    • Issue Codes — Reference for all security issues detected by Agent Scan.

    Further Reading

    • Introducing MCP-Scan
    • MCP Security Notification Tool Poisoning Attacks
    • WhatsApp MCP Exploited
    • MCP Prompt Injection
    • Toxic Flow Analysis
    • Skills Report

    Changelog

    See CHANGELOG.md.

    Similar MCP

    Based on tags & features

    • WE

      Web Eval Agent

      Python·
      1.2k
    • FH

      Fhir Mcp Server

      Python·
      55
    • AW

      Aws Mcp Server

      Python·
      165
    • SE

      Serena

      Python·
      14.5k

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k
    View All MCP Servers

    Similar MCP

    Based on tags & features

    • WE

      Web Eval Agent

      Python·
      1.2k
    • FH

      Fhir Mcp Server

      Python·
      55
    • AW

      Aws Mcp Server

      Python·
      165
    • SE

      Serena

      Python·
      14.5k

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k