home / mcp / security scanner mcp server
Provides automated MCP security testing, payload generation, asynchronous scans, and detailed vulnerability reports.
Configuration
View docs{
"mcpServers": {
"anntsmart-mcp-security-scanner": {
"url": "http://10.0.xx.xx:8000/sse"
}
}
}You run an automated MCP Security Scanner to securely probe MCP services for vulnerabilities. It discovers exposed tools, crafts targeted payloads, runs asynchronous scans, and produces detailed reports with findings and remediation guidance.
Connect your MCP client to the Security Scanner server to start a scan. Use an MCP client such as Cherry Studio, Kiro, Cursor, or Trae to point at the scanner’s HTTP endpoint. The scanner operates in two modes: a Fast mode for quick concurrent checks and a Full mode that uses comprehensive guidance from an LLM to perform deeper analysis. You can start a scan on a target MCP, monitor progress in real time, and retrieve a detailed report that includes proof of concepts and recommended fixes.
When you initiate a scan, you can reference the scanner’s HTTP URL to begin immediately, or you can use a secure token if your environment requires authentication. You will see a running progress indicator and, once complete, a full results set containing discovered tools, executed attacks, and vulnerabilities organized by severity.
To view results, request the scan details from the client interface after the scan completes. The report includes a summary with metrics such as tools discovered, injectable tools, attacks executed, and vulnerabilities found, along with detailed vulnerability entries and remediation recommendations.
pip install -r requirements.txt
# Recommended: use a virtual environment
uv init MCP
cd MCP
echo "3.13" > .python-version
uv venv
source .venv/bin/activate
uv add "mcp[cli]" httpxPrerequisites you need before installation: Python 3.10 or newer, the LangGraph framework, FastMCP, httpx, and MCP dependencies. Ensure you have a compatible runtime of your choice (Python/uv) installed on your system.
Start the MCP Security Scanner server with one of the following commands. The server exposes its status and endpoints at a default address you can use from your MCP client.
# Start with Python directly
python main.py
# Or use uv for a managed environment
uv run main.pyBy default, the server runs at http://0.0.0.0:8000/sse, which you will reference from your MCP client configuration.
You can connect to the scanner either over HTTP or via local stdio. If you have a remote scanner endpoint, you can configure the client to point at the HTTP URL. A local, in-process run uses the Python interpreter or uvx runner.
{
"mcpServers": {
"Security-Scanner": {
"url": "http://10.0.xx.xx:8000/sse",
"type": "http",
"args": []
}
}
}If you prefer a local stdio run, you can start the server with Python or uv and connect to it via the local endpoint as shown above.
The tool generates a comprehensive security report that includes a status, target, risk level, a summary with counts of discovered tools, injectable tools, attacks executed, and vulnerabilities found, plus detailed vulnerability entries grouped by severity. The report includes remediation suggestions and proof-of-concept details to help you remediate issues quickly.
Two scan modes are available: fast for rapid parallel checks and full for a complete LLM-guided exploration. The scanner supports multiple attack types such as command injection, code execution, SQL injection, SSRF, path traversal, IDOR, excessive data exposure, sensitive data disclosure, and hard-coded credentials, along with payload generation and asynchronous task management.
If you encounter connectivity issues, verify that the server is reachable at the configured URL and that the client has permission to access the endpoint. For long-running scans, use the asynchronous task management features to monitor progress. If you see authentication requirements, supply the appropriate Authorization header with a Bearer token as needed.
Use this scanner only on systems you are authorized to test. It is designed to help you identify and remedy security risks in MCP services and should be used in accordance with your organization’s security policy and applicable laws.
Automates discovery and testing of MCP service exposure for security gaps across multiple attack surfaces.
Detects execution of system commands within MCP endpoints.
Checks for arbitrary code execution vulnerabilities within MCP components.
Evaluates database query handling to identify injection flaws.
Tests access to internal resources via server-side requests.
Assesses filesystem access via crafted paths.
Verifies proper access controls to prevent unauthorized data access.
Identifies responses that leak large or sensitive datasets.
Looks for exposure of PII, HR, or financial data.
Searches for embedded credentials in schemas and configurations.
Analyzes tool metadata and usage descriptions to ensure safe payload handling.