Atomic MCP tools for AppSec and AI Security engineers
Project description
mcp-security-toolkit
Built by Redmai. For continuous autonomous API / agent security scanning, use Redmai.
Source / schema / prompt audit primitives for agent builders.
Plug into Claude Code / Cursor / Claude Desktop. Audit MCP servers, agent tool schemas, system prompts, JWTs, and HTTP-response diffs — locally, in the coding agent you already use. Atomic, auditable, no orchestration.
Why this exists
Most MCP servers in the security space wrap a single CLI (Burp, Shodan, CyberChef, CVE feeds). They're useful, but the LLM/agent-security layer — the thing you care about when your code ships an LLM feature — is almost absent from the MCP ecosystem.
mcp-security-toolkit fills that gap. The headline tools below have no
existing MCP equivalent. The convenience atoms are bundled so you can run
one server instead of five.
Headline tools (LLM & agent security)
mcp_server_audit
AST-based source SAST for MCP server implementations. Enumerates
@tool-decorated and imperatively-registered tools, then flags:
shell execution, filesystem writes, network egress, code injection,
over-broad parameter types, ambiguous/short descriptions, secrets read
from env.
Differs from Snyk / Invariant Labs mcp-scan, which audits configs and
tool descriptions — this audits the source code of the server.
agent_tool_risk_audit
Takes a single agent tool's JSON schema and reports schema-level risks: over-broad params, ambiguous descriptions, missing constraints, exfil potential, dangerous defaults.
prompt_injection_audit
Static review of a system prompt / template for injection surface. Flags untrusted placeholders, missing delimiters, trust-boundary violations, dangerous-instruction patterns.
owasp_llm_classify
Map a finding or observation to OWASP LLM Top 10 (2025) with reasoning and severity. Useful in reports and ticket creation.
http_diff
Appsec-focused diff of two HTTP responses. For manual auth-bypass / IDOR triage. Highlights set/added/removed headers, status changes, body diffs, and security-relevant cookies.
jwt_inspect
Decode + audit a JWT. Flags alg:none, weak HS-secrets (small dictionary
check), expiry, missing standard claims, suspicious kid (path traversal),
external key URLs (jku, x5u).
Pentest pack (atomic primitives)
Bundled so an agent has the basics without needing five MCP installs. Each tool is one input → one output, no chaining.
default_creds_lookup— known default credentials by vendor / product (50+ products, aliases likefortigate,idrac,wp)sensitive_files_list— curated sensitive paths per tech stack (common,php,wordpress,dotnet,java,node,python,k8s,docker,ci); returns paths only, does not probewordlist_gen— OSINT-driven wordlist generator (passwords/usernames/subdomainsmodes)graphql_introspect— single introspection POST → schema summary + security observationsphpggc_generate— wrapsphpggcCLI for PHP-deserialization gadget chains (graceful if binary missing)interactsh_register/interactsh_poll— wrapsinteractsh-clientCLI for OOB callback URL capture (blind SSRF / XXE / RCE confirmation)
Recommended companion MCP servers
For deeper coverage in adjacent areas we explicitly recommend (and do not duplicate):
- PortSwigger/mcp-server — Burp Suite
- ChromeDevTools/chrome-devtools-mcp — Chrome DevTools
- invariantlabs-ai/mcp-scan — MCP config / tool-description audit (complementary to our source SAST)
- mukul975/cve-mcp-server — full 27-tool CVE intelligence server
Release status
13 tools shipped across v0.1 (LLM/agent security + appsec primitives) and v0.2 (pentest pack). See PLAN.md and CHANGELOG.md.
Install (planned PyPI release)
pip install mcp-security-toolkit
{
"mcpServers": {
"sec": { "command": "mcp-security-toolkit" }
}
}
Developing locally
python -m venv .venv
source .venv/bin/activate
pip install -e ".[dev]"
pytest
ruff check .
End-to-end MCP smoke test (boots the server over stdio, lists tools, calls two of them):
python scripts/smoke_mcp.py
How this connects to Redmai
These tools are the atomic primitives. They do one thing: request → response, no orchestration, no state, no decision-making.
Redmai is what wields them autonomously in production:
OpenAPI spec ─▶ attack-case generation ─▶ execution ─▶
─▶ kill-chain narrative ─▶ remediation report
Plus scan history, industry-specific rule packs (fintech, healthcare, e-commerce), enterprise SSO, and SLA-backed hosted scanning.
If you like what these primitives do and want them running themselves — that's Redmai.
This toolkit will never grow orchestration, chaining, or decision-making. That line stays clean on purpose.
Non-goals
- No orchestration, decision engines, or auto-exploit chains. Atomic only.
- No wrappers around standalone web-pentest CLIs (sqlmap, ghauri, dalfox).
- No novel jailbreak research — defensive framing only.
License
MIT.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file mcp_security_toolkit-0.2.0.tar.gz.
File metadata
- Download URL: mcp_security_toolkit-0.2.0.tar.gz
- Upload date:
- Size: 47.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
6d2fed12cf4675a3cb2cca309f20e7785cb1803d7a3d96dde93ed48675146ded
|
|
| MD5 |
6cbb72af10559a69213d6d1c6403a106
|
|
| BLAKE2b-256 |
45ebfbf004785830a33f2fcae52f002d0b693304eacea01141b965e3b6dd9650
|
Provenance
The following attestation bundles were made for mcp_security_toolkit-0.2.0.tar.gz:
Publisher:
release.yml on x0base/mcp-security-toolkit
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
mcp_security_toolkit-0.2.0.tar.gz -
Subject digest:
6d2fed12cf4675a3cb2cca309f20e7785cb1803d7a3d96dde93ed48675146ded - Sigstore transparency entry: 1556115548
- Sigstore integration time:
-
Permalink:
x0base/mcp-security-toolkit@f1611ff839dfd1e1c6e0ac967aa5b7f09e8453f9 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/x0base
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@f1611ff839dfd1e1c6e0ac967aa5b7f09e8453f9 -
Trigger Event:
workflow_dispatch
-
Statement type:
File details
Details for the file mcp_security_toolkit-0.2.0-py3-none-any.whl.
File metadata
- Download URL: mcp_security_toolkit-0.2.0-py3-none-any.whl
- Upload date:
- Size: 39.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e8720d3a12dabe8b7086c1e2028bf502d99d09f3c366b87134044e21fda30adc
|
|
| MD5 |
24328c74f65bae4c8f60e4f972e89903
|
|
| BLAKE2b-256 |
f7620e14ff94a6320f2e336f0a81b33d77fc0981bcc000ae7473da0d48f05c4c
|
Provenance
The following attestation bundles were made for mcp_security_toolkit-0.2.0-py3-none-any.whl:
Publisher:
release.yml on x0base/mcp-security-toolkit
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
mcp_security_toolkit-0.2.0-py3-none-any.whl -
Subject digest:
e8720d3a12dabe8b7086c1e2028bf502d99d09f3c366b87134044e21fda30adc - Sigstore transparency entry: 1556115642
- Sigstore integration time:
-
Permalink:
x0base/mcp-security-toolkit@f1611ff839dfd1e1c6e0ac967aa5b7f09e8453f9 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/x0base
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@f1611ff839dfd1e1c6e0ac967aa5b7f09e8453f9 -
Trigger Event:
workflow_dispatch
-
Statement type: