Skip to main content

MCP injection / prompt-poisoning / SSRF scanner. 30+ canonical rules covering the April 2026 Anthropic MCP RCE class, mcp-server-git CVE chain, DockerDash injection chain, OWASP LLM Top 10 + GenAI Red Team v1. Scans live MCP /tools/list endpoints OR pasted JSON. Free 5/day, Pro £29/mo for unlimited + signed safety reports auditors and procurement accept. By MEOK AI Labs.

Project description

meok-mcp-injection-scan-mcp

Scan any MCP server for the prompt-injection / tool-poisoning / SSRF class disclosed in the April 2026 CVE wave.

pip install meok-mcp-injection-scan-mcp

Why this exists

April 2026 was a bad month for MCP. Anthropic published a "by-design" MCP RCE class affecting ~7,000 public servers (~150M downloads). mcp-server-git shipped a CVE chain. DockerDash got popped by an injection chain. Tool-description prompt injection ("tool poisoning") was demonstrated against every major MCP host.

If you run an MCP server in production, or you're auditing one before adoption, you need a fast scan that flags the patterns the April 2026 disclosures target. This MCP is that scan.

What it checks

30+ canonical rules across 5 severity tiers:

  • CRITICAL — direct RCE, system-prompt override, credential exfil patterns, shell metachars in defaults, file:// / internal-network URLs (the DockerDash 169.254.169.254 metadata-pivot vector).
  • HIGH — encoded payloads, imperative directives at the agent, supply-chain prompts, env-var references, tool shadowing.
  • MEDIUM — urgency / authority language, additionalProperties=true, unbounded strings, tool-name impersonation.
  • LOW — over-long descriptions, zero-width / bidi-override chars (the U+202E PoC vector).

Coverage maps to: OWASP LLM Top 10, GenAI Red Team v1, the April 2026 Anthropic MCP RCE disclosure, and the mcp-server-git CVE chain.

Tools exposed

Tool Purpose
scan_mcp_url(url) Fetch a remote MCP server's tool listing and scan it
audit_tool_descriptions(tools_json) Scan a pasted JSON tool list (auth-walled servers)
signed_safety_report(subject, findings_json, score, note) Issue a procurement-grade signed cert (Pro tier)
list_rules() Inspect the full rule catalogue before subscribing
pricing() Subscribe links + tier comparison

Pricing

Tier Price What you get
Free £0 5 scans / day, no signed reports
Starter £29/mo Unlimited scans + signed reports
Pro £79/mo + scheduled rescans + 48h support
Enterprise £1,499/mo + custom rule packs + 4h SLA

Every signed cert lives at https://meok-attestation-api.vercel.app/verify/<cert_id> — auditors and procurement teams confirm without an account.

What you do NOT get

This is a static-pattern scanner. It does not run dynamic taint analysis, fuzz the server with adversarial inputs, or replace a human red-team. It is the first 80% of the audit, in 5 seconds, for free.

Built by MEOK AI Labs

Solo founder. London. 234 MCP packages on PyPI. Live signing infrastructure at meok-attestation-api.vercel.app. Storefront councilof.ai. Get the catalogue: https://meok-attestation-api.vercel.app/catalogue.


Distribution channels

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

meok_mcp_injection_scan_mcp-1.0.2.tar.gz (13.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

meok_mcp_injection_scan_mcp-1.0.2-py3-none-any.whl (12.7 kB view details)

Uploaded Python 3

File details

Details for the file meok_mcp_injection_scan_mcp-1.0.2.tar.gz.

File metadata

File hashes

Hashes for meok_mcp_injection_scan_mcp-1.0.2.tar.gz
Algorithm Hash digest
SHA256 90f341bbe8a6f94d53c745338aaf5ab8fdf615dc283153681034df7eacfe496a
MD5 529a7820e383031a812b7f24bb2d70b2
BLAKE2b-256 e0c2f2a4aa3b1789918c94d7db8d7fcc3003aa7b6a1778e5743476796c48f13a

See more details on using hashes here.

File details

Details for the file meok_mcp_injection_scan_mcp-1.0.2-py3-none-any.whl.

File metadata

File hashes

Hashes for meok_mcp_injection_scan_mcp-1.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 35ca310fe8953f0659af85e3f3ce1bd8887751fd32484847c621ea6749b32be0
MD5 906b98a6eeae3a4cfb0d476c63a25964
BLAKE2b-256 142cbbde8444d8bc26587402f2d845eab5b64f8889857b4ff9e1336a64e9b66c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page