Skip to main content

Live-runtime security and stress testing for MCP servers — adversarial payloads, load & concurrency, latency, auth bypass. SARIF output.

Project description

MCPSafe

PyPI version Python License: Noncommercial Modules Tests SARIF

MCP has 97 million installs. Most MCP security tools scan static config files or tool descriptions. MCPSafe is the first to connect to a live running server and test actual runtime behavior — including load testing, latency benchmarking, and cross-request data leakage under concurrency.

MCPSafe is the first open-source security and stress-testing framework for MCP (Model Context Protocol) servers. Connect it to any MCP server over stdio or HTTP and get a full audit — prompt injection, path traversal, type confusion, missing auth, load behaviour, and more — in a single command.

📖 Interactive Learning Guide

New to MCPSafe or want to understand how the code works? The learning guide covers every module, attack type, and code pattern — with quizzes!

👉 Open the MCPSafe Learning Guide

(Or open mcpsafe-learning-guide.html locally — it's fully self-contained, no internet required.)


Why MCPSafe?

Most MCP security tools analyze tool descriptions statically. MCPSafe connects to your live running server and tests actual runtime behavior.

Approach Tools MCPSafe
Static description analysis Snyk Agent Scan, Proximity ✅ via T04
Live adversarial payload testing mcpwn ✅ via T02/T03
Load & concurrency testing Nobody ✅ via T05
Latency benchmarking Nobody ✅ via T08
Cross-request data leakage Nobody ✅ via T05-001
JSON Schema validation Nobody ✅ via T06
Reverse prompt-injection (tool output poisoning) Nobody ✅ via T09
Cross-session data leakage (multi-tenant bleed) Nobody ✅ via T10
Timing side-channel enumeration Nobody ✅ via T11
Error-message secret leakage (15 patterns) Nobody ✅ via T12
Server-initiated sampling abuse Nobody ✅ via T13
Notification-flood DoS Nobody ✅ via T14
Concurrent-call reentrancy (state bleed) Nobody ✅ via T15
Silent capability creep Nobody ✅ via T16
Cross-session SHA-256 description drift Nobody ✅ via T17
SSRF via resource URIs (10 payloads) Nobody ✅ via T18
Unicode homoglyph tool impersonation Nobody ✅ via T19
Server-side memory-leak detection Nobody ✅ via T20
SARIF for GitHub Security tab Nobody (yet)
Regression tracking (compare) Nobody
No account or API key needed mcpwn only
Rate-limit-aware pacing for auth-gated APIs Nobody

Real-World Results

MCPSafe v0.2.0 audited 13 MCP servers — including Stripe's, Cloudflare's, GitHub's, and Anthropic's reference servers. Four false-positive fixes have been applied and the numbers below are the audited, validated counts after those fixes:

  • T02 Injection — IPv4 pattern now matches only private-range IPs (10.x, 172.16-31.x, 192.168.x, 127.x, 169.254.x). Public IPs in legitimate API responses (GitHub JSON, timestamps, version strings) no longer false-positive.
  • T05 Load — connection-drop failures downgraded from HIGH to MEDIUM (a reliability limit, not a security hole). Genuine concurrency bugs still flagged HIGH.
  • T09 Output Sanitization — pass-through tools (read_file, git_diff, fetch, search_issues, etc.) no longer scanned for PI markers, since their output is verbatim data.
  • T19 Homoglyph — confusable / mixed-script identifiers only flagged HIGH when the name actually collides with an existing ASCII identifier on the same server.

3,500+ tests across 20 modules · 0 CRITICAL · 33 HIGH · ~470 MEDIUM

Server Transport CRITICAL HIGH MEDIUM Notable Finding
@modelcontextprotocol/server-everything stdio 16 71 Stored PI via args-prompt; DoS via INT_MAX on trigger-long-running-operation
mcp-server-sqlite (uvx) stdio 14 8 Stored PI via mcp-demo prompt template
mcp.stripe.com (auth) 💳 HTTP 170 Injection echoes across create_refund, cancel_subscription, list_payment_intents
mcp-server-fetch (uvx) stdio 2 15 Prompt injection in fetch tool; 100 KB payload DoS
mcp_text_processor (test) stdio 1 42 100 KB payload triggered hard timeout
@modelcontextprotocol/server-filesystem stdio 91 Injection echoes in OS error messages
@modelcontextprotocol/server-github (auth) stdio 45 Injection payloads echoed in search-result error messages
mcp-server-git (uvx) stdio ~60 Git tool error messages echo injection payloads
mcp_calculator (test) stdio 20
mcp_notes (test) stdio 37
mcp-server-time (uvx) stdio 14
docs.mcp.cloudflare.com (auth) HTTP 2
observability.mcp.cloudflare.com (auth) HTTP 1

Selected Findings

@modelcontextprotocol/server-everything (Anthropic's reference server)16 HIGH, 0 CRITICAL. Two vulnerability classes: (1) Stored prompt injection — 14 HIGH findings from the args-prompt prompt template, which embeds raw argument values directly into generated LLM messages. (2) DoS via integer overflowtrigger-long-running-operation hangs 35+ seconds on 2147483647 (INT_MAX) and 1e308 (max float), confirmed resource-exhaustion DoS on Anthropic's own reference implementation.

mcp-server-sqlite (uvx)14 HIGH, all from the mcp-demo prompt template. The prompt embeds raw argument values into generated messages without sanitisation. Every PI-001..PI-016 payload becomes a stored prompt injection landing in the LLM context window.

mcp.stripe.com (Stripe Payments, live HTTP, auth)170 MEDIUM. Stripe's production server echoes injection payloads verbatim across every financial tool — create_refund, cancel_subscription, create_invoice, list_payment_intents, and more. Any LLM consuming Stripe tool output is a prompt-injection attack surface.

@modelcontextprotocol/server-filesystem91 MEDIUM injection echoes across file-path tools (read_file, write_file, list_directory). The tools pass raw argument strings to OS syscalls; malformed paths return OS errors containing the injection payload verbatim.

@modelcontextprotocol/server-github45 MEDIUM injection echoes via search_issues / search_repositories. These tools pass user query strings to GitHub's API, which returns search results verbatim. An LLM reading the output could follow injected instructions — lower severity than a direct data leak because the echo is bounded by the API's search response shape.

mcp-server-fetch (uvx)2 HIGH: classic prompt injection via the fetch tool's URL/prompt arguments, and a type-validation crash on float-where-int input.

mcp_text_processor (test server)1 HIGH: extract_emails hard-timed out on a 100 KB payload — real resource-exhaustion DoS.

observability.mcp.cloudflare.com (Cloudflare, live HTTP, auth)1 MEDIUM. T04-001 detected description growth (1,001 → 1,603 chars) between calls — consistent with CDN edge truncation, correctly classified as MEDIUM (not a deliberate rug-pull).


Quick Start

pip install mcpsafe
# Scan a local stdio server
mcpsafe scan "uvx mcp-server-git"

# Scan an HTTP server (Streamable HTTP auto-detected on /mcp endpoints)
mcpsafe scan "https://docs.mcp.cloudflare.com/mcp" --transport http

# Scan an HTTP server that requires authentication
mcpsafe scan "https://observability.mcp.cloudflare.com/mcp" --transport http \
  --header "Authorization=Bearer cfat_your_token_here"

# Pass multiple HTTP headers
mcpsafe scan "https://api.example.com/mcp" --transport http \
  --header "Authorization=Bearer token" \
  --header "X-Org-ID=my-org"

# Output JSON + HTML + SARIF (all formats)
mcpsafe scan "npx -y @modelcontextprotocol/server-filesystem /tmp" --output all

# Pass subprocess environment variables (stdio servers only)
mcpsafe scan "uvx mcp-server-github" --env GITHUB_TOKEN=ghp_xxx

# Generate a config file
mcpsafe init

# Compare two scans to track regressions
mcpsafe compare report-v1.json report-v2.json

What It Tests

MCPSafe v0.2.0 runs 200+ test types across 20 modules covering discovery, security, performance, and schema validation.

Core Modules (T01–T08) — Foundation

Module Category What It Checks
T01 Discovery DISCOVERY Server enumeration, tool listing, resource/prompt exposure, metadata consistency
T02 Injection SECURITY 16 prompt injection payloads per string parameter — classic overrides, SQL probes, shell metacharacters, Unicode RLO, path traversal, Jinja / Python format injections
T03 Fuzzer SECURITY Type confusion, boundary values, oversized payloads, deep nesting, NaN/Infinity across every tool parameter
T04 Tool Poison SECURITY Tool description mutation (rug-pull attacks), baseline drift, hidden instructions. Growth-only vs true-mutation classification eliminates CDN truncation false positives
T05 Load PERFORMANCE Concurrent load (10/50/100 calls), cross-request UUID leakage detection, reconnect stability
T06 Schema SCHEMA JSON Schema validation, required field enforcement, description quality scoring
T07 Auth SECURITY Missing auth, Bearer bypass, protocol version abuse, replay attacks, homoglyph tool name spoofing
T08 Latency PERFORMANCE Baseline latency, P95/P99 percentiles, cold-start detection, post-load degradation

New in v0.2.0 (T09–T20) — Advanced Attack Surfaces

Features found in no other MCP security tool:

Module Category What It Checks
T09 Output Sanitization SECURITY Reverse prompt injection — scans tool output for PI markers that would poison the next LLM call. Skips pass-through tools (file/diff/fetch/search) to avoid false positives on data content
T10 Cross-Session Leakage SECURITY Plants a unique marker via session A, opens an independent session B, checks if B sees A's data — detects shared cache/global-state multi-tenancy failures
T11 Timing Side-Channel SECURITY Statistical timing comparison of plausible-vs-random inputs. Trimmed means + 5× ratio + 30 ms absolute threshold to detect enumeration oracles without jitter FPs
T12 Error Secret Leakage SECURITY Triggers malformed-argument error paths and scans output for 15 secret patterns: AWS / GitHub / OpenAI / Anthropic / Stripe keys, JWTs, Bearer tokens, DB URIs, /etc/passwd, env vars, private IPs
T13 Sampling Abuse SECURITY Audits sampling capability advertisement and attempts to detect unsolicited server → client sampling requests during tool execution
T14 Notification Flood SECURITY Monitors inbound notifications during a 5 s quiet window. Flags >5/sec as MEDIUM, >30 total as HIGH — client-side DoS
T15 Reentrancy SECURITY 6 concurrent calls with unique markers; any response containing a marker the caller didn't send = shared-state bug
T16 Capability Creep SECURITY Snapshots tools / resources / prompts / capabilities at T=0 and T=3 s; any silent addition or removal is flagged
T17 Hash Drift SECURITY SHA-256 fingerprint of every tool/resource/prompt description. Compares across two independent sessions — catches per-connection A/B testing (rug-pull precursor)
T18 Resource URI SSRF SECURITY 10 malicious URIs fed to read_resource: AWS / GCP / Azure metadata, file://, loopback (Redis, Elasticsearch), SSH keys, DNS-rebind probes
T19 Unicode Homoglyph SECURITY Confusable characters (Cyrillic / Greek / fullwidth), mixed-script identifiers, invisible controls (ZWSP, BOM, RLO). Only flags HIGH when the name collapses to an existing ASCII identifier — no false positives on legitimate i18n
T20 Memory Leak PERFORMANCE 40-call probe; trimmed-quartile response-size and latency drift analysis + subprocess RSS growth (stdio + psutil)

Real Vulnerabilities MCPSafe Catches

Stored prompt injection via tool output (T02, T09) — Every string passed to a tool parameter gets bounced back through 16 attack payloads (PI-001..PI-016). If any payload appears verbatim in the response, the test flags it. Confirmed on server-everything, sqlite, server-filesystem, server-github, mcp-server-git, and mcp.stripe.com.

Prompt template injection (T02, stored PI) — Prompts like args-prompt on server-everything and mcp-demo on sqlite embed raw argument values into LLM messages. 14-16 HIGH findings per server — every payload lands in the AI's context window verbatim.

Tool description rug-pull attacks (T04, documented by Invariant Labs 2025) — Tool description mutates silently between list_tools() calls. Growth-only mutations are correctly downgraded to MEDIUM to avoid CDN truncation false positives.

DoS via integer overflow (T03) — Confirmed on Anthropic's trigger-long-running-operation: INT_MAX (2,147,483,647) and 1e308 cause 35+ second hangs.

Cross-request data leakage under concurrency (T05-001) — Embeds unique UUIDs in 10 concurrent calls; if call A's response contains call B's UUID, shared state is leaking between parallel requests. Same class as MCP TypeScript SDK CVE (CVSS 7.1).

SSRF via resource URIs (T18) — Feeds file:///etc/passwd, AWS metadata IP 169.254.169.254, and 8 other malicious URIs to read_resource. CRITICAL when the response content actually matches metadata/file format.

Error message secret leakage (T12) — Catches servers that stringify DB connection strings, env vars, API keys, or JWTs into exception messages — 15-pattern regex library with value redaction in reports.

T03 Fuzzer — Fuzz Case Corpus

  • String attacks: null bytes, Unicode overlong sequences, ANSI escapes, format strings (%s %n), 1 MB payloads
  • Integer boundary: MAX_INT32+1, MIN_INT32-1, beyond int64 (9_223_372_036_854_775_808), zero, negatives
  • Type confusion: strings where integers expected ("NaN", "Infinity", "-1"), objects in array slots
  • Array attacks: 10,000-element array, mixed-type array (1,000 elements), 100-level deep nested array
  • Number edge cases: "NaN", "Infinity", "-Infinity", 1e308 (overflow), 1e-308 (underflow)
  • Object attacks: deeply nested objects, conflicting keys, unexpected extra fields

T07 Auth — Authentication & Protocol Tests

Missing auth detection, Bearer token bypass, API key abuse, JWT none-algorithm attack, OAuth scope escalation, session token fixation, rate-limit detection (429/ratelimit/throttle), protocol version abuse against all known MCP versions (2024-11-05, 2024-10-07, 2025-03-26), duplicate initialize() replay with session health check, and Unicode homoglyph tool-name spoofing.

T06 Schema — Description Quality Scoring

Includes a description quality check (T06-006) that scores tool descriptions for LLM usability:

Finding Severity
No description at all MEDIUM
Useless description ("A tool", "Does stuff") MEDIUM
Description under 30 characters LOW
No parameter documentation signals LOW
All descriptions adequate PASS

CLI Reference

mcpsafe scan

Usage: mcpsafe scan [OPTIONS] TARGET

Options:
  --transport  TEXT     Transport type: stdio | http  [default: stdio]
  --output     TEXT     Report format: json | html | sarif | all  [default: json]
  --timeout    INT      Per-call timeout in seconds  [default: 30]
  --modules    TEXT     Comma-separated module IDs (e.g. T01,T02,T07)
  --env        TEXT     KEY=VALUE subprocess env var, stdio only (repeatable)
  --header     TEXT     KEY=VALUE HTTP request header, http transport (repeatable)
  --config     PATH     Path to mcpsafe.toml config file
  --out-dir    PATH     Directory for output reports  [default: ./mcpsafe-reports]
  --no-load            Skip T05-003 stress test and large injection payloads
  --verbose            Print full details for every finding as they are found

--header vs --env — Use --header to pass HTTP request headers (Authorization, API keys) when scanning HTTP/HTTPS MCP servers. Use --env to set subprocess environment variables for stdio servers that read credentials from the environment.

HTTP transport auto-detection — MCPSafe automatically selects the right HTTP client based on the URL. URLs ending in /mcp use the MCP Streamable HTTP protocol (required by Cloudflare and newer servers). URLs ending in /sse use the legacy SSE protocol. Any other URL appends /mcp and tries Streamable HTTP first.

mcpsafe init

Generate a commented mcpsafe.toml configuration file with all available options documented.

mcpsafe init                        # writes mcpsafe.toml in current directory
mcpsafe init --output /path/to/dir  # write to specific path
mcpsafe init --force                # overwrite existing file

MCPSafe warns if mcpsafe.toml contains sensitive key names (token, secret, key, password, api_key) and checks Unix file permissions (recommends chmod 600).

mcpsafe compare

Diff two JSON reports to surface new findings and regressions between scans.

mcpsafe compare baseline.json latest.json

mcpsafe list-modules

Show all available test modules and their test IDs.

mcpsafe version

Print the MCPSafe version and exit.


Output Formats

JSON

Structured report with all findings, server metadata, and summary statistics. All server-supplied strings are sanitised (NUL bytes, ANSI escapes, control characters stripped) before serialisation.

{
  "scan_id": "a1b2c3d4-...",
  "mcpsafe_version": "0.2.0",
  "started_at": "2026-04-14T10:23:45Z",
  "server_info": { "name": "mcp-server-git", "protocol_version": "2024-11-05", "tool_count": 12 },
  "summary": { "total_tests": 607, "passed": 534, "failed": 73, "overall_severity": "MEDIUM" },
  "results": [ { "test_id": "T02-001", "severity": "MEDIUM", "description": "..." } ]
}

HTML

Self-contained single-file report (no CDN dependencies) with a severity donut chart, per-category findings tables, and a clean dark/light design. Suitable for sharing with stakeholders or attaching to a GitHub issue.

SARIF 2.1.0

GitHub Security tab compatible. Non-PASS findings are emitted as SARIF results.

MCPSafe Severity SARIF Level
CRITICAL / HIGH error
MEDIUM warning
LOW / INFO note
PASS (omitted)

GitHub Actions integration:

- name: Scan MCP server
  run: mcpsafe scan --transport stdio --target "uvx mcp-server-git" --output sarif --out-dir sarif-output

- name: Upload SARIF to GitHub Security
  uses: github/codeql-action/upload-sarif@v3
  with:
    sarif_file: sarif-output/

CI/CD Integration

MCPSafe exits with code 1 if CRITICAL or HIGH findings are detected, making it a natural pipeline gate.

# .github/workflows/mcp-security.yml
name: MCP Security Scan

on: [push, pull_request]

jobs:
  scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Install MCPSafe
        run: pip install mcpsafe

      - name: Scan MCP server
        run: |
          mcpsafe scan \
            --transport stdio \
            --target "uvx mcp-server-git" \
            --output all \
            --out-dir ./mcpsafe-output

      - name: Upload SARIF to GitHub Security
        uses: github/codeql-action/upload-sarif@v3
        if: always()
        with:
          sarif_file: ./mcpsafe-output/

      - name: Upload HTML report
        uses: actions/upload-artifact@v4
        if: always()
        with:
          name: mcpsafe-report
          path: ./mcpsafe-output/*.html

Example Terminal Output

╭─────────────────────────────────────────────╮
│ MCPSafe v0.2.0                              │
│ MCP Server Security & Stress Tester         │
╰─────────────────────────────────────────────╯

Target:     uvx mcp-server-git --repository .
Transport:  stdio
Server:     mcp-server-git  (protocol 2024-11-05)
Tools:      12   Resources: 0   Prompts: 0

Running 20 modules (600+ tests)...

  ✓ T01 Discovery              100%  0:00:00
  ✓ T08 Latency Baseline       100%  0:00:00
  ✓ T06 Schema                 100%  0:00:00
  ⚠ T02 Injection              100%  0:00:15   [MEDIUM]
  ⚠ T03 Fuzzer                 100%  0:00:15   [MEDIUM]
  ✓ T04 Tool Poison            100%  0:00:13
  ✓ T09 Output Sanitization    100%  0:00:06
  ✓ T12 Error Secret Leakage   100%  0:00:14
  ✓ T13 Sampling Abuse         100%  0:00:07
  ⚠ T16 Capability Creep       100%  0:00:14   [MEDIUM]
  ✓ T18 SSRF                   100%  0:00:00
  ✓ T19 Homoglyph              100%  0:00:00
  ⚠ T07 Auth                   100%  0:00:08   [LOW]
  ✓ T11 Timing Side-Channel    100%  0:00:00
  ✓ T15 Reentrancy             100%  0:00:00
  ⚠ T05 Load                   100%  0:00:13   [MEDIUM]
  ✓ T10 Cross-Session Leakage  100%  0:00:01
  ✓ T17 Hash Drift             100%  0:00:01
  ✓ T14 Notification Flood     100%  0:00:05
  ✓ T20 Memory Leak            100%  0:00:00
  ✓ T08-005 Latency Comparison 100%  0:00:00

┌──────────┬───────┐
│ CRITICAL │   0   │
│ HIGH     │   0   │
│ MEDIUM   │  60   │
│ LOW      │  10   │
│ INFO     │  18   │
│ PASS     │ 534   │
└──────────┴───────┘

Reports saved:
  JSON  → ./mcpsafe-reports/mcpsafe-git-20260414-091438.json
  HTML  → ./mcpsafe-reports/mcpsafe-git-20260414-091438.html
  SARIF → ./mcpsafe-reports/mcpsafe-git-20260414-091438.sarif

Exit 0 — no CRITICAL or HIGH findings.

Architecture

mcpsafe/
├── cli.py              # click CLI: scan, init, compare, list-modules, version
├── runner.py           # async orchestration, module dispatch, rich progress
├── transport.py        # MCP connection factory (stdio / HTTP, async context managers)
├── models.py           # dataclasses: TestResult, ScanReport, ServerInfo, Severity, Category
├── tests/
│   ├── _helpers.py     # RateLimiter, SECRET_PATTERNS, cap_response, sanitise_server_string
│   ├── t01_discovery.py            # T01 — capability enumeration
│   ├── t02_injection.py            # T02 — prompt injection payloads
│   ├── t03_fuzzer.py               # T03 — malformed input fuzzing
│   ├── t04_tool_poison.py          # T04 — rug-pull mutation detection
│   ├── t05_load.py                 # T05 — load / concurrency / UUID leakage
│   ├── t06_schema.py               # T06 — JSON Schema validation
│   ├── t07_auth.py                 # T07 — auth / protocol / replay tests
│   ├── t08_latency.py              # T08 — latency benchmarks
│   ├── t09_output_sanitization.py  # T09 — reverse PI detection ✨ v0.2.0
│   ├── t10_cross_session.py        # T10 — cross-session data leakage ✨
│   ├── t11_timing_side_channel.py  # T11 — timing enumeration oracles ✨
│   ├── t12_secret_leakage.py       # T12 — 15 secret patterns in errors ✨
│   ├── t13_sampling_abuse.py       # T13 — server-initiated sampling ✨
│   ├── t14_notification_flood.py   # T14 — client-side DoS ✨
│   ├── t15_reentrancy.py           # T15 — concurrent-call state bleed ✨
│   ├── t16_capability_creep.py     # T16 — silent inventory drift ✨
│   ├── t17_hash_drift.py           # T17 — SHA-256 cross-session fingerprints ✨
│   ├── t18_ssrf.py                 # T18 — resource URI SSRF (10 payloads) ✨
│   ├── t19_homoglyph.py            # T19 — Unicode confusables ✨
│   └── t20_memory_leak.py          # T20 — RSS / latency / size drift ✨
└── reporter/
    ├── _common.py      # canonical server_slug() used by all reporters
    ├── json_reporter.py
    ├── html_reporter.py
    └── sarif_reporter.py
templates/
└── report.html.j2

Design principles:

  • All I/O is async/await — no blocking calls on the event loop
  • Every test returns a TestResult dataclass — no raw dicts cross module boundaries
  • All MCP calls are wrapped in try/except — no test can crash the runner
  • Timing is always measured in milliseconds via time.perf_counter()
  • Server-supplied strings are sanitised at every output boundary (terminal, JSON, HTML, SARIF)

Security Hardening (MCPSafe Itself)

MCPSafe is hardened against the same classes of attack it tests for:

Rich markup injection prevention — Server-supplied strings are passed through rich.markup.escape() before embedding in terminal output. A malicious server cannot inject markup into the operator's terminal.

Immutable test resultsHtmlReporter uses dataclasses.replace() to create sanitised copies of TestResult objects rather than mutating originals. The source ScanReport is never modified, so JSON and HTML reports written sequentially are always consistent.

Recursive JSON sanitisationJsonReporter applies _sanitise_value() (depth-capped at 10) before json.dumps(). NUL bytes, ANSI escapes, and control characters from untrusted servers cannot corrupt SIEM parsers or log aggregators.

Per-scan state isolationt08_latency.py clears the module-level _baseline_latencies dict at the start of every scan, preventing timing data from a prior run leaking into sequential scans in the same process.

Config credential warningsmcpsafe init warns if mcpsafe.toml contains keys matching sensitive patterns and checks Unix file permissions.

Input validation--timeout and --concurrency are validated before the scan starts. mcpsafe compare uses a defensive _load_report() helper that validates JSON shape, required keys, and type-checks each result before display.


Options Reference

Option Default Description
--transport stdio Transport protocol: stdio, http
--output json Report format: json, html, sarif, all
--modules all Comma-separated module IDs to run
--out-dir ./mcpsafe-reports Directory to save reports
--timeout 30 Seconds per MCP call before timeout
--header KEY=VALUE HTTP request header, http transport only (repeatable)
--env KEY=VALUE subprocess env var, stdio transport only (repeatable)
--config Path to mcpsafe.toml
--no-load false Skip T05-003 stress test and large payloads
--verbose false Print each finding as it is discovered

Severity Levels

Level Meaning
CRITICAL Exploitable — should block deployment
HIGH Serious — requires prompt remediation
MEDIUM Potential vulnerability — should be investigated
LOW Best-practice gap or informational weakness
INFO Neutral observation (e.g. expected rate-limit, API auth required)
PASS Test passed — no issue found

Development

git clone https://github.com/Ravikiranbantwal/mcpsafe
cd mcpsafe
pip install -e ".[dev]"

# Run unit tests
pytest tests/ -v

# Run against a real server
mcpsafe scan "uvx mcp-server-git" --verbose

Adding a Test Module

  1. Create mcpsafe/tests/t21_yourmodule.py (next available number after T20)
  2. Implement async def run(session, server_info, config) -> list[TestResult]
  3. Register in mcpsafe/runner.py (both the import block and the execution plan)
  4. Use test IDs in format T21-001, T21-002, …
  5. Return TestResult dataclasses — never raise exceptions; catch everything and wrap with TestResult.from_exception()
  6. If your module needs rate limiting on auth-gated HTTP servers, use RateLimiter(config) from mcpsafe.tests._helpers

Contributing

Pull requests are welcome. Please open an issue before implementing a new test module.

  • Every public function needs a docstring and type hints
  • All MCP calls must be wrapped in try/except — never let a test crash the runner
  • Run pytest tests/ before submitting

Legal / Responsible Use

MCPSafe is intended for use against MCP servers you own or have explicit written permission to test. Unauthorized scanning of third-party servers may violate computer fraud laws in your jurisdiction (including the CFAA in the US, the Computer Misuse Act in the UK, and equivalent legislation elsewhere). The authors accept no liability for misuse.

Use MCPSafe responsibly:

  • Only scan servers you own, operate, or have written authorisation to test
  • Do not use MCPSafe against production services without the operator's consent
  • Treat any findings as confidential until disclosed to the server operator

License

Polyform Noncommercial License 1.0.0 — free for personal use, academic research, open-source projects, and non-profit security work. Commercial use (paid audits, S

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mcpsafe-0.2.0.tar.gz (1.2 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mcpsafe-0.2.0-py3-none-any.whl (162.0 kB view details)

Uploaded Python 3

File details

Details for the file mcpsafe-0.2.0.tar.gz.

File metadata

  • Download URL: mcpsafe-0.2.0.tar.gz
  • Upload date:
  • Size: 1.2 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for mcpsafe-0.2.0.tar.gz
Algorithm Hash digest
SHA256 5ae40b01d9f2a0ae46305848e6ddb45c497d387bcc17d5d7d2393d47a0031b3f
MD5 a5bba4d3b9feff2cc1ab63d50d3dad9c
BLAKE2b-256 a8d428dbdc5eecf7e39ace5ba82ea30caa18476bc909feb884cbf069e8aa16e1

See more details on using hashes here.

Provenance

The following attestation bundles were made for mcpsafe-0.2.0.tar.gz:

Publisher: publish.yml on Ravikiranbantwal/mcpsafe

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file mcpsafe-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: mcpsafe-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 162.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for mcpsafe-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 d851eb57794481d6b9f3b5874cda82f1144b3cc169fca4e245e706b2dbd29189
MD5 af2e0a809f8e65f4f94ce5c22dcb0e1c
BLAKE2b-256 3c3f8e26e17fee2a06b7cd3baad8a0bf923b94c7b8ba64cd776527b0f7963373

See more details on using hashes here.

Provenance

The following attestation bundles were made for mcpsafe-0.2.0-py3-none-any.whl:

Publisher: publish.yml on Ravikiranbantwal/mcpsafe

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page