Skip to main content

A comprehensive MCP configuration scanner with client-aware security analysis.

Project description

MCP Checkpoint


:rocket: Overview

MCP Checkpoint is a comprehensive security scanner for Model Context Protocol (MCP). Automatically discovers, analyzes, and secures MCP servers integrated with all major Agentic IDEs, Agents and Clients.


MCP Checkpoint

:bulb: Features

  • 🔍 Auto-Discovery: Finds known MCP configurations for popular Agentic IDEs like Cursor, Windsurf, VS Code, Claude Desktop, and more
  • 🔧 Tool, Resource & Prompt Inventory: Connects to MCP servers and catalogs available tools, resources, and prompt templates
  • 🛡️ Security Analysis: Specialized security checks including Prompt Injection, Rug Pull Attack, Cross-server Tool Shadowing, Tool Poisoning, Tool Name Ambiguity, and more..
  • 🧭 Baseline Drift Detection: Captures approved MCP components and detects rug pulls attacks
  • 📊 Comprehensive Reporting: Generates JSON and Markdown reports with actionable findings
  • 📜 Audit Trail: Timestamped baselines and reports for full traceability of changes and findings

:toolbox: Installation

pip install mcp-checkpoint

:running: Quick Start

# Scan all configurations with security analysis (auto-detects baseline.json if present)
mcp-checkpoint scan

# Inspect configurations and generate baseline (defaults to baseline.json)
mcp-checkpoint inspect

# Use custom configuration file
mcp-checkpoint scan --config /path/to/config.json

# Scan multiple configuration files
 mcp-checkpoint scan \
   --config /path/to/cursor.mcp.json \
   --config /path/to/vscode.mcp.json

# Use custom baseline file path
mcp-checkpoint inspect --baseline /path/to/my-baseline.json
mcp-checkpoint scan --baseline /path/to/my-baseline.json

# Generate markdown report
mcp-checkpoint scan --report-type md

# Save to custom file
mcp-checkpoint scan --output my-report.json
mcp-checkpoint scan --report-type md --output my-report.md

:gear: Command Options

Option Description
--config Custom configuration file path (can be used multiple times)
--baseline Baseline file for drift detection (scan) or creation (inspect)
--report-type {json,md} Output format (default: json)
--output Custom output file path
--verbose Detailed terminal output
--show-logs Display debug logs in terminal

:beginner: Security Checks

🛡️ Standard Checks

  • Prompt Injection
  • Indirect Prompt Injection
  • Cross-Server Tool Shadowing
  • Tool Poisoning
    • Prompt Injection in Tool Description, Name and Args
    • Command Injection in Tool Description, Name and Args
  • Tool Name Ambiguity
  • Command Injection
  • Excessive Tool Permissions
  • Hardcoded Secrets

🧭 Baseline Checks

Detects deviations from approved MCP components (requires a baseline generated via inspect mode):

  • Rug Pull Attack
    • Tool Modified
    • Resource Modified
    • Resource Template Modified
    • Prompt Modified

:page_with_curl: Logging

Logs are automatically saved to logs/mcp_checkpoint.log:

# Default: logs saved to file only
mcp-checkpoint scan

# Show logs in terminal too
mcp-checkpoint scan --show-logs

:test_tube: Demo

Test MCP Checkpoint using our intentionally vulnerable MCP servers. For details, see the demo guide.

:zap: Want More?

This open-source version covers static MCP configuration scanning. For teams that need deeper protection, Aira Security offers a full enterprise platform with:

Capability Open Source Aira Platform
MCP config scanning
Prompt & command injection detection
Tool poisoning & shadowing checks
Hardcoded secrets detection
Runtime enforcement & blocking
Agent behavior policy enforcement (toxic flow analysis)
Skills scanner (agentic workflow & capability analysis)
Custom security policies
Aira dashboard (centralized visibility & alerting)
Complete Agentic Security (beyond MCP — Agents, Workflows, and Skills)

🚀 See Aira in Action to experience the full platform.

:star2: Community

Join our Slack - a space for developers and security engineers building together to secure AI agents.

:question: FAQs

Q: Is my source code ever shared, or does everything run locally?

MCP Checkpoint runs entirely locally. Inspect and scan modes analyze your MCP configurations, detect MCP servers integrated with your agents, and evaluate them directly on your machine. Prompt injection checks use our open-source model Aira-security/FT-Llama-Prompt-Guard-2, downloaded from Hugging Face to your local environment, ensuring your data and code is never shared externally.

:balance_scale: License

Distributed under the Apache 2.0 License. See LICENSE for more information.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mcp_checkpoint-2.1.1.tar.gz (50.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mcp_checkpoint-2.1.1-py3-none-any.whl (53.7 kB view details)

Uploaded Python 3

File details

Details for the file mcp_checkpoint-2.1.1.tar.gz.

File metadata

  • Download URL: mcp_checkpoint-2.1.1.tar.gz
  • Upload date:
  • Size: 50.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.8.3

File hashes

Hashes for mcp_checkpoint-2.1.1.tar.gz
Algorithm Hash digest
SHA256 914eb6a95251a3e67fea70104849fe8b7c468d32b26040462a5dd61f9cab4096
MD5 affae8c95263f2ba510b444cac0e7486
BLAKE2b-256 0915421617afb20708c31f1b9ed577f0962dcacd640dc81cc73ac1b5e6e8eb9f

See more details on using hashes here.

File details

Details for the file mcp_checkpoint-2.1.1-py3-none-any.whl.

File metadata

File hashes

Hashes for mcp_checkpoint-2.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 980ad08188dee1ccbbdfc681133145fe1d030aafb4b30418f515ec4eff1e9ed1
MD5 061b67b45f5c23cab14c870c8e260f21
BLAKE2b-256 98046269a2db811ba93b727882896a412045739819afb341eb7250df7db1621d

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page