mcp-sentinel-scanner
Scan any MCP server against 177 security detection rules — directly from Claude, Cursor, or any MCP client.
npx mcp-sentinel-scannerQuick Setup
Add to Claude Desktop
Open your Claude Desktop config and add the scanner as an MCP server:
{
"mcpServers": {
"mcp-sentinel-scanner": {
"command": "npx",
"args": ["-y", "mcp-sentinel-scanner"]
}
}
}Ask Claude to scan
Just ask in natural language. The scanner exposes three tools that Claude can call:
Get actionable results
Every finding includes evidence (what triggered it) and remediation (how to fix it).
Available Tools
scan_server
Analyze server metadata without a live connection. Pass tools, descriptions, source code, and dependencies. Returns findings + score.
scan_endpoint
Connect to a live MCP server endpoint. Enumerates tools via initialize + tools/list (safe, read-only), then runs all 177 detection rules.
list_rules
List all available detection rules. Filter by category or severity to explore specific rule sets.
Example Output
What a scan result looks like:
{
"server_name": "my-mcp-server",
"total_score": 62,
"rating": "Moderate",
"findings_count": 3,
"findings": [
{
"rule": "Prompt Injection in Tool Description",
"severity": "critical",
"evidence": "Tool description contains injection pattern:
'ignore all previous instructions'",
"remediation": "Remove instruction-like language from
tool descriptions. Use factual, concise descriptions."
},
{
"rule": "Hardcoded Secrets",
"severity": "high",
"evidence": "Hardcoded API key pattern detected:
sk-proj-abc123...",
"remediation": "Move secrets to environment variables.
Never hardcode API keys in source code."
},
{
"rule": "Missing Input Validation",
"severity": "medium",
"evidence": "Parameter 'query' has type string with
no maxLength, pattern, or enum constraint.",
"remediation": "Add maxLength, pattern, or enum
constraints to string parameters."
}
],
"score_breakdown": {
"total_score": 62,
"code_score": 85,
"deps_score": 100,
"config_score": 92,
"description_score": 50,
"behavior_score": 100
}
}Score Interpretation
Detection Coverage
177 rules across 17 categories
Safety
The scanner never invokes tools on target servers. It only calls initialize and tools/list for enumeration. All analysis is deterministic — no LLM calls, no false positives from probabilistic models.
Other MCP Clients
Works with any MCP-compatible client:
Settings → MCP → Add Server.vscode/mcp.json~/.codeium/windsurf/mcp_config.jsonclaude mcp add mcp-sentinel-scanner