Thin client MCP server for AI Security Scanner - connects to cloud-hosted 27 agents (100% OWASP coverage)
Project description
AI Security Scanner MCP
World's first comprehensive agentic AI security scanner (27 agents covering 100% OWASP ASI + LLM) available as a simple one-command MCP integration with Claude Code.
🚀 Quick Installation
claude mcp add ai-security-scanner uvx ai-security-mcp
That's it! The scanner is now integrated with Claude Code and ready to use.
✨ Features
- 27 Specialized Security Agents: 17 OWASP ASI + 10 OWASP LLM agents
- 100% OWASP Coverage: Complete Agentic Security Interface and LLM coverage
- Local Processing: No cloud dependencies for basic scanning
- Lightning Fast: Sub-second scan times for most repositories
- Comprehensive Detection: Memory poisoning, tool misuse, prompt injection, and more
- Native Claude Integration: Seamless MCP protocol integration
🔍 Supported Vulnerabilities
OWASP ASI (Agentic Security Interface) - 17 Agents
- ASI01: Memory Poisoning
- ASI02: Tool Misuse
- ASI03: Privilege Compromise
- ASI04: Resource Overload
- ASI05: Cascading Hallucination Attacks
- ASI06: Intent Breaking Goal Manipulation
- ASI07: Misaligned Deceptive Behaviors
- ASI08: Repudiation Untraceability
- ASI09: Identity Spoofing Impersonation
- ASI10: Overwhelming Human in the Loop
- ASI11: Unexpected RCE Code Attacks
- ASI12: Agent Communication Poisoning
- ASI13: Rogue Agents MultiAgent Systems
- ASI14: Human Attacks MultiAgent Systems
- ASI15: Human Manipulation
- ASI16: Insecure InterAgent Protocol Abuse
- ASI17: Vulnerable Agentic Supply Chain
OWASP LLM Top 10 - 10 Agents
- LLM01: Prompt Injection
- LLM02: Insecure Output Handling
- LLM03: Training Data Poisoning
- LLM04: Model Denial of Service
- LLM05: Supply Chain Vulnerabilities
- LLM06: Sensitive Information Disclosure
- LLM07: Insecure Plugin Design
- LLM08: Excessive Agency
- LLM09: Overreliance
- LLM10: Model Theft
📖 Usage
After installation, simply ask Claude Code to scan your code:
Basic Repository Scan
Scan this repository for agentic AI vulnerabilities
Targeted Analysis
Use the AI Security Scanner to check for prompt injection vulnerabilities in this code:
[your code here]
Agent Information
List all available security agents in the AI Security Scanner
Demo Scan
Run a demo scan to see the AI Security Scanner in action
🎯 Example Output
🔍 AI Security Scan Results
📊 Summary:
- Agents Run: 27/27
- Vulnerabilities Found: 14
- Critical: 7, High: 7, Medium: 0, Low: 0
- Scan Time: 96ms
🚨 Critical Vulnerabilities:
1. ASI01 Memory Poisoning - Vector store integrity validation missing
2. ASI02 Tool Misuse - No tool access control policies detected
3. ASI04 Resource Overload - No recursion depth limits configured
4. ASI06 Intent Breaking - Missing intent safety guardrails
🛠️ Remediation guidance provided for all findings
🏗️ Architecture
The AI Security Scanner MCP follows the same simple pattern as Semgrep:
- One-Command Installation:
uvx ai-security-mcphandles all dependencies - Stdio Transport: Direct JSON-RPC communication with Claude Code
- Local Processing: All 27 agents run locally for privacy and speed
- Zero Configuration: Works immediately without setup files
🔧 Advanced Usage
Available MCP Tools
scan_repository- Scan local repository or fileslist_agents- List all 27 security agents and capabilitiesdemo_scan- Run demonstration with vulnerable code sampleshealth_check- Check server and agent status
Custom Agent Selection
Scan this code using only memory poisoning and tool misuse agents
Output Formats
summary- Executive summary with key findings (default)detailed- Complete vulnerability details with evidencejson- Machine-readable format for automation
🚀 Performance
- Installation Time: < 10 seconds
- First Scan: < 30 seconds for typical repositories
- Memory Usage: < 500MB during scanning
- Agent Execution: Parallel processing for maximum speed
🛡️ Privacy & Security
- Local Processing: No data sent to external servers
- Read-Only Access: Scanner cannot modify your files
- Zero Telemetry: No usage tracking or data collection
- Open Source: Transparent security analysis
🐛 Troubleshooting
Installation Issues
# Verify uvx is available
uvx --version
# Check Claude Code MCP status
/mcp
Scanner Not Found
Ensure the MCP server is properly registered:
claude mcp list
You should see ai-security-scanner in the list.
No Scan Results
Try the demo scan first:
Run a demo scan with the AI Security Scanner
📚 Documentation
- Full Documentation: https://ai-threat-scanner.com/docs
- OWASP ASI Specification: https://owasp.org/www-project-ai-security-and-privacy-guide/
- Bug Reports: https://github.com/ai-security-scanner/ai-security-mcp/issues
🤝 Contributing
We welcome contributions! Please see our contributing guidelines and code of conduct.
📄 License
MIT License - see LICENSE file for details.
🔗 Links
- Website: https://ai-threat-scanner.com
- GitHub: https://github.com/ai-security-scanner/ai-security-mcp
- PyPI: https://pypi.org/project/ai-security-mcp/
- Claude Code: https://claude.ai/code
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file ai_security_mcp-1.0.21.tar.gz.
File metadata
- Download URL: ai_security_mcp-1.0.21.tar.gz
- Upload date:
- Size: 9.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
dcc6cf3bdb7e28118262f610a11951e272676631b66fbe0e2f9cc81b5345dbef
|
|
| MD5 |
167034fa5352d5bc30d2f41ce43b763f
|
|
| BLAKE2b-256 |
d56181e5e3b105f248c4606f2598338d13de43e00b7380e8cf09a7bd8691dada
|
File details
Details for the file ai_security_mcp-1.0.21-py3-none-any.whl.
File metadata
- Download URL: ai_security_mcp-1.0.21-py3-none-any.whl
- Upload date:
- Size: 8.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1bd5cca7730a644d94804ad7f2a1d05fa352f9bc96f242dccb70bb89b45a37cf
|
|
| MD5 |
398aec74314315b0b9b21d1815c0ebb5
|
|
| BLAKE2b-256 |
d0a76bd6a10f0346a6d8463406c9cf0cccf3458910abbb73a98347785b56896c
|