MCP injection / prompt-poisoning / SSRF scanner. 30+ canonical rules covering the April 2026 Anthropic MCP RCE class, mcp-server-git CVE chain, DockerDash injection chain, OWASP LLM Top 10 + GenAI Red Team v1. Scans live MCP /tools/list endpoints OR pasted JSON. Free 5/day, Pro £29/mo for unlimited + signed safety reports auditors and procurement accept. By MEOK AI Labs.
Project description
meok-mcp-injection-scan-mcp
Scan any MCP server for the prompt-injection / tool-poisoning / SSRF class disclosed in the April 2026 CVE wave.
pip install meok-mcp-injection-scan-mcp
Why this exists
April 2026 was a bad month for MCP. Anthropic published a "by-design" MCP RCE class affecting ~7,000 public servers (~150M downloads). mcp-server-git shipped a CVE chain. DockerDash got popped by an injection chain. Tool-description prompt injection ("tool poisoning") was demonstrated against every major MCP host.
If you run an MCP server in production, or you're auditing one before adoption, you need a fast scan that flags the patterns the April 2026 disclosures target. This MCP is that scan.
What it checks
30+ canonical rules across 5 severity tiers:
- CRITICAL — direct RCE, system-prompt override, credential exfil patterns, shell metachars in defaults, file:// / internal-network URLs (the DockerDash 169.254.169.254 metadata-pivot vector).
- HIGH — encoded payloads, imperative directives at the agent, supply-chain prompts, env-var references, tool shadowing.
- MEDIUM — urgency / authority language,
additionalProperties=true, unbounded strings, tool-name impersonation. - LOW — over-long descriptions, zero-width / bidi-override chars (the U+202E PoC vector).
Coverage maps to: OWASP LLM Top 10, GenAI Red Team v1, the April 2026 Anthropic MCP RCE disclosure, and the mcp-server-git CVE chain.
Tools exposed
| Tool | Purpose |
|---|---|
scan_mcp_url(url) |
Fetch a remote MCP server's tool listing and scan it |
audit_tool_descriptions(tools_json) |
Scan a pasted JSON tool list (auth-walled servers) |
signed_safety_report(subject, findings_json, score, note) |
Issue a procurement-grade signed cert (Pro tier) |
list_rules() |
Inspect the full rule catalogue before subscribing |
pricing() |
Subscribe links + tier comparison |
Pricing
| Tier | Price | What you get |
|---|---|---|
| Free | £0 | 5 scans / day, no signed reports |
| Starter | £29/mo | Unlimited scans + signed reports |
| Pro | £79/mo | + scheduled rescans + 48h support |
| Enterprise | £1,499/mo | + custom rule packs + 4h SLA |
Every signed cert lives at https://meok-attestation-api.vercel.app/verify/<cert_id> — auditors and procurement teams confirm without an account.
What you do NOT get
This is a static-pattern scanner. It does not run dynamic taint analysis, fuzz the server with adversarial inputs, or replace a human red-team. It is the first 80% of the audit, in 5 seconds, for free.
Built by MEOK AI Labs
Solo founder. London. 234 MCP packages on PyPI. Live signing infrastructure at meok-attestation-api.vercel.app. Storefront councilof.ai. Get the catalogue: https://meok-attestation-api.vercel.app/catalogue.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file meok_mcp_injection_scan_mcp-1.0.0.tar.gz.
File metadata
- Download URL: meok_mcp_injection_scan_mcp-1.0.0.tar.gz
- Upload date:
- Size: 10.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.15
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3a3cec38d194da6170c015fd7af873190283168ae0ae66f3528498d43f26e675
|
|
| MD5 |
c2aeda0fc1d177192a82738d76e782eb
|
|
| BLAKE2b-256 |
11425498c10450fae16b1fd679dcd7bb5f77c7e5a301fc86cee332103f3d0107
|
File details
Details for the file meok_mcp_injection_scan_mcp-1.0.0-py3-none-any.whl.
File metadata
- Download URL: meok_mcp_injection_scan_mcp-1.0.0-py3-none-any.whl
- Upload date:
- Size: 12.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.15
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
11a89cc4d9dfc3a9ee3e6154ff7bc35df6ffac46a97c1427a5006c03bda9ad5f
|
|
| MD5 |
c4eb1d07ccb4d6210e8f5452de42a11a
|
|
| BLAKE2b-256 |
4cfce9df2fff863a2c8639aea29183e5b9c803b4699fcc82554165c07f10586e
|