Skip to main content

OWASP Top 10 for AI Agents security assessment tools. Capabilities: full agent security scan, prompt injection detection, tool poisoning check, excessive agency, data leakage. Built by MEOK AI Labs.

Project description

owasp-agentic-mcp MCP server

PyPI Downloads GitHub stars License: MIT

OWASP Agentic AI MCP

Security assessment against the OWASP Top 10 for Agentic AI (2025). Prompt injection detection, tool poisoning checks, excessive agency evaluation, and data leakage analysis.

MEOK AI Labs

Install · Tools · Pricing · Attestation API


Why This Exists

The OWASP Top 10 for Agentic AI (released 2025) defines the ten most critical security risks for AI agents that can take actions, use tools, and operate autonomously. As organisations deploy MCP servers, LangChain agents, and autonomous AI workflows, these systems face attack vectors that traditional AppSec testing does not cover.

Prompt injection, tool poisoning, excessive agency, and cross-context data leakage are not theoretical: they are actively exploited. CISOs and security teams need a structured way to assess agentic AI deployments against the OWASP classification. This MCP evaluates your agent architecture against all 10 risk categories and produces actionable findings.

Install

pip install owasp-agentic-mcp

Tools

Tool OWASP Reference What it does
assess_agent_security All 10 risks Full security posture assessment against OWASP Top 10 for Agentic AI
check_prompt_injection Risk A01 Detect prompt injection attack vectors in agent inputs
check_tool_poisoning Risk A02 Evaluate tool definitions and MCP configs for poisoning risks
check_excessive_agency Risk A03 Assess whether agent has more permissions than needed
check_data_leakage Risk A06 Identify cross-context data leakage paths in agent workflows

Example

Prompt: "Assess the security of our customer support AI agent.
It has access to 12 MCP tools including database queries, email
sending, and file system access. It operates on user prompts
with no input sanitisation."

Result: Assessment across all 10 OWASP Agentic AI risks with critical
findings: A01 prompt injection (no input sanitisation on user prompts),
A02 tool poisoning (3 MCP tools loaded without integrity checks),
A03 excessive agency (file system + email + database = over-privileged),
A06 data leakage (database query results passed through to email tool
without redaction). Remediation priorities and control recommendations
provided for each finding.

Pricing

Tier Price What you get
Free £0 10 calls/day — agent security assessment
Pro £199/mo Unlimited + HMAC-signed attestations + verify URLs
Enterprise £1,499/mo Multi-tenant + co-branded reports + webhooks

Subscribe to Pro · Enterprise

Attestation API

Every Pro/Enterprise audit produces a cryptographically signed certificate:

POST https://meok-attestation-api.vercel.app/sign
GET  https://meok-attestation-api.vercel.app/verify/{cert_id}

Zero-dep verifier: pip install meok-attestation-verify

Links

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

owasp_agentic_mcp-1.0.3.tar.gz (12.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

owasp_agentic_mcp-1.0.3-py3-none-any.whl (10.5 kB view details)

Uploaded Python 3

File details

Details for the file owasp_agentic_mcp-1.0.3.tar.gz.

File metadata

  • Download URL: owasp_agentic_mcp-1.0.3.tar.gz
  • Upload date:
  • Size: 12.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.9.6

File hashes

Hashes for owasp_agentic_mcp-1.0.3.tar.gz
Algorithm Hash digest
SHA256 d7bd057a17925ea09ebf30d001d28b6f657e81dc3a6cdb1d80eb5b5d5c68f3bb
MD5 84e0f683db904fb25d36675fc2f6cf2b
BLAKE2b-256 c54c329491a33baf9782639c7623449ff9593256bf99fd83956a7bf78d1538d3

See more details on using hashes here.

File details

Details for the file owasp_agentic_mcp-1.0.3-py3-none-any.whl.

File metadata

File hashes

Hashes for owasp_agentic_mcp-1.0.3-py3-none-any.whl
Algorithm Hash digest
SHA256 c504d0e3d4f71a5b13c86cd0e3eab3735ef2a6db0b546529b504a1c045d73ca6
MD5 6d444df08cc8ebfb49e5139a86823cf7
BLAKE2b-256 fbe042af1c95340a044ae11f6432b805957b4ab63bb0ca06276c63d527f8a3ee

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page