Skip to main content

Atomic MCP tools for AppSec and AI Security engineers

Project description

mcp-security-toolkit

CI PyPI Python License: MIT

Built by Redmai. For continuous autonomous API / agent security scanning, use Redmai.

Source / schema / prompt audit primitives for agent builders.

Plug into Claude Code / Cursor / Claude Desktop. Audit MCP servers, agent tool schemas, system prompts, JWTs, and HTTP-response diffs — locally, in the coding agent you already use. Atomic, auditable, no orchestration.

Why this exists

Most MCP servers in the security space wrap a single CLI (Burp, Shodan, CyberChef, CVE feeds). They're useful, but the LLM/agent-security layer — the thing you care about when your code ships an LLM feature — is almost absent from the MCP ecosystem.

mcp-security-toolkit fills that gap. The headline tools below have no existing MCP equivalent. The convenience atoms are bundled so you can run one server instead of five.


Headline tools (LLM & agent security)

mcp_server_audit

AST-based source SAST for MCP server implementations. Enumerates @tool-decorated and imperatively-registered tools, then flags: shell execution, filesystem writes, network egress, code injection, over-broad parameter types, ambiguous/short descriptions, secrets read from env.

Differs from Snyk / Invariant Labs mcp-scan, which audits configs and tool descriptions — this audits the source code of the server.

agent_tool_risk_audit

Takes a single agent tool's JSON schema and reports schema-level risks: over-broad params, ambiguous descriptions, missing constraints, exfil potential, dangerous defaults.

prompt_injection_audit

Static review of a system prompt / template for injection surface. Flags untrusted placeholders, missing delimiters, trust-boundary violations, dangerous-instruction patterns.

owasp_llm_classify

Map a finding or observation to OWASP LLM Top 10 (2025) with reasoning and severity. Useful in reports and ticket creation.

http_diff

Appsec-focused diff of two HTTP responses. For manual auth-bypass / IDOR triage. Highlights set/added/removed headers, status changes, body diffs, and security-relevant cookies.

jwt_inspect

Decode + audit a JWT. Flags alg:none, weak HS-secrets (small dictionary check), expiry, missing standard claims, suspicious kid (path traversal), external key URLs (jku, x5u).


Pentest pack (atomic primitives)

Bundled so an agent has the basics without needing five MCP installs. Each tool is one input → one output, no chaining.

  • default_creds_lookup — known default credentials by vendor / product (50+ products, aliases like fortigate, idrac, wp)
  • sensitive_files_list — curated sensitive paths per tech stack (common, php, wordpress, dotnet, java, node, python, k8s, docker, ci); returns paths only, does not probe
  • wordlist_gen — OSINT-driven wordlist generator (passwords / usernames / subdomains modes)
  • graphql_introspect — single introspection POST → schema summary + security observations
  • phpggc_generate — wraps phpggc CLI for PHP-deserialization gadget chains (graceful if binary missing)
  • interactsh_register / interactsh_poll — wraps interactsh-client CLI for OOB callback URL capture (blind SSRF / XXE / RCE confirmation)

Recommended companion MCP servers

For deeper coverage in adjacent areas we explicitly recommend (and do not duplicate):


Release status

13 tools shipped across v0.1 (LLM/agent security + appsec primitives) and v0.2 (pentest pack). See PLAN.md and CHANGELOG.md.

Install (planned PyPI release)

pip install mcp-security-toolkit
{
  "mcpServers": {
    "sec": { "command": "mcp-security-toolkit" }
  }
}

Developing locally

python -m venv .venv
source .venv/bin/activate
pip install -e ".[dev]"
pytest
ruff check .

End-to-end MCP smoke test (boots the server over stdio, lists tools, calls two of them):

python scripts/smoke_mcp.py

How this connects to Redmai

These tools are the atomic primitives. They do one thing: request → response, no orchestration, no state, no decision-making.

Redmai is what wields them autonomously in production:

OpenAPI spec  ─▶  attack-case generation  ─▶  execution  ─▶
              ─▶  kill-chain narrative   ─▶  remediation report

Plus scan history, industry-specific rule packs (fintech, healthcare, e-commerce), enterprise SSO, and SLA-backed hosted scanning.

If you like what these primitives do and want them running themselves — that's Redmai.

This toolkit will never grow orchestration, chaining, or decision-making. That line stays clean on purpose.

Non-goals

  • No orchestration, decision engines, or auto-exploit chains. Atomic only.
  • No wrappers around standalone web-pentest CLIs (sqlmap, ghauri, dalfox).
  • No novel jailbreak research — defensive framing only.

License

MIT.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mcp_security_toolkit-0.2.0.tar.gz (47.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mcp_security_toolkit-0.2.0-py3-none-any.whl (39.9 kB view details)

Uploaded Python 3

File details

Details for the file mcp_security_toolkit-0.2.0.tar.gz.

File metadata

  • Download URL: mcp_security_toolkit-0.2.0.tar.gz
  • Upload date:
  • Size: 47.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for mcp_security_toolkit-0.2.0.tar.gz
Algorithm Hash digest
SHA256 6d2fed12cf4675a3cb2cca309f20e7785cb1803d7a3d96dde93ed48675146ded
MD5 6cbb72af10559a69213d6d1c6403a106
BLAKE2b-256 45ebfbf004785830a33f2fcae52f002d0b693304eacea01141b965e3b6dd9650

See more details on using hashes here.

Provenance

The following attestation bundles were made for mcp_security_toolkit-0.2.0.tar.gz:

Publisher: release.yml on x0base/mcp-security-toolkit

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file mcp_security_toolkit-0.2.0-py3-none-any.whl.

File metadata

File hashes

Hashes for mcp_security_toolkit-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 e8720d3a12dabe8b7086c1e2028bf502d99d09f3c366b87134044e21fda30adc
MD5 24328c74f65bae4c8f60e4f972e89903
BLAKE2b-256 f7620e14ff94a6320f2e336f0a81b33d77fc0981bcc000ae7473da0d48f05c4c

See more details on using hashes here.

Provenance

The following attestation bundles were made for mcp_security_toolkit-0.2.0-py3-none-any.whl:

Publisher: release.yml on x0base/mcp-security-toolkit

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page