Skip to main content

Thin client MCP server for AI Security Scanner - connects to cloud-hosted 27 agents (100% OWASP coverage)

Project description

AI Security Scanner MCP

World's first comprehensive agentic AI security scanner (27 agents covering 100% OWASP ASI + LLM) available as a simple one-command MCP integration with Claude Code.

🚀 Quick Installation

claude mcp add ai-security-scanner uvx ai-security-mcp

That's it! The scanner is now integrated with Claude Code and ready to use.

✨ Features

  • 27 Specialized Security Agents: 17 OWASP ASI + 10 OWASP LLM agents
  • 100% OWASP Coverage: Complete Agentic Security Interface and LLM coverage
  • Local Processing: No cloud dependencies for basic scanning
  • Lightning Fast: Sub-second scan times for most repositories
  • Comprehensive Detection: Memory poisoning, tool misuse, prompt injection, and more
  • Native Claude Integration: Seamless MCP protocol integration

🔍 Supported Vulnerabilities

OWASP ASI (Agentic Security Interface) - 17 Agents

  • ASI01: Memory Poisoning
  • ASI02: Tool Misuse
  • ASI03: Privilege Compromise
  • ASI04: Resource Overload
  • ASI05: Cascading Hallucination Attacks
  • ASI06: Intent Breaking Goal Manipulation
  • ASI07: Misaligned Deceptive Behaviors
  • ASI08: Repudiation Untraceability
  • ASI09: Identity Spoofing Impersonation
  • ASI10: Overwhelming Human in the Loop
  • ASI11: Unexpected RCE Code Attacks
  • ASI12: Agent Communication Poisoning
  • ASI13: Rogue Agents MultiAgent Systems
  • ASI14: Human Attacks MultiAgent Systems
  • ASI15: Human Manipulation
  • ASI16: Insecure InterAgent Protocol Abuse
  • ASI17: Vulnerable Agentic Supply Chain

OWASP LLM Top 10 - 10 Agents

  • LLM01: Prompt Injection
  • LLM02: Insecure Output Handling
  • LLM03: Training Data Poisoning
  • LLM04: Model Denial of Service
  • LLM05: Supply Chain Vulnerabilities
  • LLM06: Sensitive Information Disclosure
  • LLM07: Insecure Plugin Design
  • LLM08: Excessive Agency
  • LLM09: Overreliance
  • LLM10: Model Theft

📖 Usage

After installation, simply ask Claude Code to scan your code:

Basic Repository Scan

Scan this repository for agentic AI vulnerabilities

Targeted Analysis

Use the AI Security Scanner to check for prompt injection vulnerabilities in this code:

[your code here]

Agent Information

List all available security agents in the AI Security Scanner

Demo Scan

Run a demo scan to see the AI Security Scanner in action

🎯 Example Output

🔍 AI Security Scan Results

📊 Summary:
- Agents Run: 27/27
- Vulnerabilities Found: 14
- Critical: 7, High: 7, Medium: 0, Low: 0
- Scan Time: 96ms

🚨 Critical Vulnerabilities:
1. ASI01 Memory Poisoning - Vector store integrity validation missing
2. ASI02 Tool Misuse - No tool access control policies detected
3. ASI04 Resource Overload - No recursion depth limits configured
4. ASI06 Intent Breaking - Missing intent safety guardrails

🛠️ Remediation guidance provided for all findings

🏗️ Architecture

The AI Security Scanner MCP follows the same simple pattern as Semgrep:

  1. One-Command Installation: uvx ai-security-mcp handles all dependencies
  2. Stdio Transport: Direct JSON-RPC communication with Claude Code
  3. Local Processing: All 27 agents run locally for privacy and speed
  4. Zero Configuration: Works immediately without setup files

🔧 Advanced Usage

Available MCP Tools

  • scan_repository - Scan local repository or files
  • list_agents - List all 27 security agents and capabilities
  • demo_scan - Run demonstration with vulnerable code samples
  • health_check - Check server and agent status

Custom Agent Selection

Scan this code using only memory poisoning and tool misuse agents

Output Formats

  • summary - Executive summary with key findings (default)
  • detailed - Complete vulnerability details with evidence
  • json - Machine-readable format for automation

🚀 Performance

  • Installation Time: < 10 seconds
  • First Scan: < 30 seconds for typical repositories
  • Memory Usage: < 500MB during scanning
  • Agent Execution: Parallel processing for maximum speed

🛡️ Privacy & Security

  • Local Processing: No data sent to external servers
  • Read-Only Access: Scanner cannot modify your files
  • Zero Telemetry: No usage tracking or data collection
  • Open Source: Transparent security analysis

🐛 Troubleshooting

Installation Issues

# Verify uvx is available
uvx --version

# Check Claude Code MCP status
/mcp

Scanner Not Found

Ensure the MCP server is properly registered:

claude mcp list

You should see ai-security-scanner in the list.

No Scan Results

Try the demo scan first:

Run a demo scan with the AI Security Scanner

📚 Documentation

🤝 Contributing

We welcome contributions! Please see our contributing guidelines and code of conduct.

📄 License

MIT License - see LICENSE file for details.

🔗 Links

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ai_security_mcp-1.0.21.tar.gz (9.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

ai_security_mcp-1.0.21-py3-none-any.whl (8.3 kB view details)

Uploaded Python 3

File details

Details for the file ai_security_mcp-1.0.21.tar.gz.

File metadata

  • Download URL: ai_security_mcp-1.0.21.tar.gz
  • Upload date:
  • Size: 9.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.9.6

File hashes

Hashes for ai_security_mcp-1.0.21.tar.gz
Algorithm Hash digest
SHA256 dcc6cf3bdb7e28118262f610a11951e272676631b66fbe0e2f9cc81b5345dbef
MD5 167034fa5352d5bc30d2f41ce43b763f
BLAKE2b-256 d56181e5e3b105f248c4606f2598338d13de43e00b7380e8cf09a7bd8691dada

See more details on using hashes here.

File details

Details for the file ai_security_mcp-1.0.21-py3-none-any.whl.

File metadata

File hashes

Hashes for ai_security_mcp-1.0.21-py3-none-any.whl
Algorithm Hash digest
SHA256 1bd5cca7730a644d94804ad7f2a1d05fa352f9bc96f242dccb70bb89b45a37cf
MD5 398aec74314315b0b9b21d1815c0ebb5
BLAKE2b-256 d0a76bd6a10f0346a6d8463406c9cf0cccf3458910abbb73a98347785b56896c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page