Skip to main content

Security scanner for MCP bundles. Powers mpak Certified verification.

Project description

mpak-scanner

CI PyPI Python License mpak.dev

Security scanner for MCP bundles (.mcpb). Reference implementation of the mpak Trust Framework (MTF), an open security standard for MCP server packaging.

Built by NimbleBrain, mpak-scanner powers the mpak Certified verification on the mpak registry, analyzing bundles for supply chain risks, code quality issues, and compliance with the MTF specification.

What it does

mpak-scanner analyzes MCP bundles (.mcpb files) for security issues before installation:

  • Supply Chain: SBOM generation, vulnerability scanning, dependency analysis
  • Code Quality: Secret detection, malicious pattern detection, static analysis
  • Artifact Integrity: Manifest validation, content hashes, signatures
  • Provenance: Source repository verification, author identity, build attestation
  • Capability Declaration: Tool declarations, permission scopes

Compliance Levels

The scanner evaluates bundles against four compliance levels defined in the MTF specification:

Level Name Target Controls
L1 Basic Personal projects 6
L2 Standard Team tools, published packages 12
L3 Verified Production, enterprise 17
L4 Attested Critical infrastructure 20

Installation

# Install with uv (recommended)
uv pip install mpak-scanner

# Or with pip
pip install mpak-scanner

External Tools

The scanner integrates with these tools for deeper analysis. Controls gracefully skip if a tool is not installed.

Tool Purpose Install
Syft SBOM generation brew install syft
Grype Vulnerability scanning brew install grype
TruffleHog Secret detection brew install trufflehog
GuardDog Malicious package detection uv pip install guarddog
Bandit Python static analysis uv pip install bandit
ESLint JavaScript static analysis npm install -g eslint eslint-plugin-security

Usage

Command Line

# Scan a bundle
mpak-scanner scan bundle.mcpb

# Output JSON report
mpak-scanner scan bundle.mcpb --json

# Check specific compliance level
mpak-scanner scan bundle.mcpb --level 2

Python API

from mpak_scanner import scan_bundle

report = scan_bundle("bundle.mcpb")
print(f"Compliance Level: {report.compliance_level}")
print(f"Risk Score: {report.risk_score}")

for finding in report.findings:
    print(f"[{finding.severity}] {finding.control}: {finding.message}")

Specification

This scanner implements the mpak Trust Framework (MTF). See the full specification for details on compliance levels, controls, and verification methods.

Development

# Install dev dependencies
uv sync --dev

# Run all tests
uv run pytest

# Lint and format
uv run ruff check src/ tests/
uv run ruff format --check src/ tests/

# Type check
uv run ty check src/

# Full verification
uv run ruff check src/ tests/ && uv run ruff format --check src/ tests/ && uv run ty check src/ && uv run pytest

Test Fixtures

The scanner ships with test fixtures for validation:

Fixture Tests Expected
clean-l1-bundle/ Valid L1 bundle All controls pass
has-secrets-bundle/ CQ-01 detection Fails with secret findings
invalid-manifest-bundle/ AI-01 validation Fails on missing fields
missing-tools-bundle/ CD-01 validation Fails on tool issues
has-vulns-bundle/ SC-02 detection Fails with CVE findings
node-server-bundle/ Node.js bundle All controls pass
unsafe-node-bundle/ CQ-05 detection Fails with unsafe patterns

See tests/fixtures/README.md for details.

Releasing

Releases are automated via GitHub Actions. Pushing a tag triggers the full pipeline: verify, publish to PyPI (via trusted publishing), and build + push Docker image to GHCR.

Version is defined in one place: pyproject.toml. The runtime version (mpak_scanner.__version__, SCANNER_VERSION) is derived automatically via importlib.metadata.

Steps

  1. Bump version in pyproject.toml:

    # Edit pyproject.toml version field, or use hatch:
    hatch version patch   # 0.2.4 → 0.2.5
    hatch version minor   # 0.2.4 → 0.3.0
    
  2. Run verification:

    uv run ruff check src/ tests/ && uv run ruff format --check src/ tests/ && uv run ty check src/ && uv run pytest
    
  3. Commit and push:

    git commit -am "scanner: bump to X.Y.Z"
    git push
    
  4. Tag and push (this triggers the publish):

    git tag scanner-vX.Y.Z
    git push origin scanner-vX.Y.Z
    

CI will:

  • Run lint, format, type check, and unit tests
  • Verify the tag matches pyproject.toml
  • Build and publish to PyPI
  • Build and push Docker image to ghcr.io/nimblebraininc/mpak-scanner:{version} and :latest

See scanner-publish.yml.

Docker Image

The Docker image includes all external security tools (Syft, Grype, TruffleHog, ESLint, Bandit, GuardDog) and installs mpak-scanner from PyPI.

# Pull from GHCR
docker pull ghcr.io/nimblebraininc/mpak-scanner:latest

# Run a scan
docker run --rm -v /path/to/bundle.mcpb:/bundle.mcpb ghcr.io/nimblebraininc/mpak-scanner scan /bundle.mcpb

For production deployment to ECR/K8s, see deployments/mpak/.

Related Projects

Contributing

See CONTRIBUTING.md for how to add new controls or improve detection rules.

License

Apache License 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mpak_scanner-0.2.5.tar.gz (136.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mpak_scanner-0.2.5-py3-none-any.whl (79.9 kB view details)

Uploaded Python 3

File details

Details for the file mpak_scanner-0.2.5.tar.gz.

File metadata

  • Download URL: mpak_scanner-0.2.5.tar.gz
  • Upload date:
  • Size: 136.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for mpak_scanner-0.2.5.tar.gz
Algorithm Hash digest
SHA256 ddb89acb39d9942cc2e48dc68a5e7f0df3b6f295b610b8237ccec5c72692eb81
MD5 21932215f8ff49837c0f96d28b7f124e
BLAKE2b-256 eb4c4191cfe5e4eb4e5637c2c5c7485d8c5bb91139bce9346424273598339a12

See more details on using hashes here.

Provenance

The following attestation bundles were made for mpak_scanner-0.2.5.tar.gz:

Publisher: scanner-publish.yml on NimbleBrainInc/mpak

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file mpak_scanner-0.2.5-py3-none-any.whl.

File metadata

  • Download URL: mpak_scanner-0.2.5-py3-none-any.whl
  • Upload date:
  • Size: 79.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for mpak_scanner-0.2.5-py3-none-any.whl
Algorithm Hash digest
SHA256 03cfb42a751a73384eae89608b8bc7fc13c877c56cb83de023fe3998a82c1829
MD5 40e83cb166d0a5dd3050e7229908abcd
BLAKE2b-256 5e63dd0069868527582cfab9954e3cdd705e647522a502322956d18b716237bf

See more details on using hashes here.

Provenance

The following attestation bundles were made for mpak_scanner-0.2.5-py3-none-any.whl:

Publisher: scanner-publish.yml on NimbleBrainInc/mpak

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page