mcpscc
Security Command Center for Model Context Protocol (MCP) servers. Detect prompt injection, tool poisoning, secrets, and vulnerabilities. The Trivy of MCP security.
claude mcp add --transport stdio gensecaihq-mcpscc docker run -p 8000:8000 mscc
How to use
MSCC (MSCC - MCP Security Command Center) is a security scanner for MCP servers. It analyzes your MCP implementations to detect vulnerabilities such as prompt injection, tool poisoning, secret exposure, and other MCP-related risks using a curated set of detection patterns and YARA rules. The project exposes an API-friendly interface and tooling to scan local MCP server installations, export reports (JSON, SARIF, HTML, PDF), and integrate into CI/CD workflows. You can run the scanner locally, in a container, or integrate it into your CI to continuously verify the security posture of your MCP servers.
To use the server tooling, you can run the API server (either directly via Python/uvicorn or via Docker) to provide a live scanning endpoint, or you can leverage the Python SDK (MSCCClient) and CLI (mscc) to perform scans, export reports, or embed scanning into scripts. The available capabilities include running scans against a local MCP server path or a Git repository, generating SARIF or PDF reports, and performing automated checks in CI pipelines. The scanner also ships with a variety of detection rules organized by language and MCP Top 10 coverage, plus the ability to add custom YARA rules for organization-specific checks.
How to install
Prerequisites:
- Python 3.9+ for the Python-based tooling and SDK (optional if you use Docker/CLI only)
- Docker (optional if you prefer containerized runs)
- Git (for cloning sources or examples)
Option A: Install and run locally with Python (SDK + API server)
-
Clone the repository (or install via PyPI if available): git clone https://github.com/gensecaihq/mcpscc.git cd mcpscc
-
Create and activate a Python virtual environment: python -m venv .venv source .venv/bin/activate
-
Install the package with development extras (API, PDF, etc.): pip install -e ".[dev,api,pdf]"
-
Run the API server directly (example using uvicorn): uvicorn mscc.api.app:app --host 0.0.0.0 --port 8000
Option B: Run using Docker (recommended for simplicity and isolation)
- Build and run the MSCC API container (assuming Dockerfile is present): docker build -t mscc . docker run -p 8000:8000 mscc
Option C: Quick start using the Python SDK (no server required)
-
Install the base SDK: pip install mscc
-
Use the Python SDK in your scripts to scan local MCP servers, export reports, and handle findings as shown in the Quick Start example in the repository README.
Additional notes
Tips and common issues:
- If you run the API server, ensure port 8000 is accessible from your CI/CD or local tooling. Adjust the port as needed in your environment.
- When using Docker, keep the image up to date to receive the latest detection rules and language support.
- You can customize reporting exports (PDF, SARIF, HTML) via the MSCC client/reporting API in your scripts or CI jobs.
- Environment variables you may encounter include configuration for database/redis backends when using the API server in production (e.g., REDIS_URL, DATABASE_URL). If you enable caching or a persistent database, configure these values accordingly.
- The Docker approach is ideal for CI environments; the Python-based approach is flexible for local development and scripting.
- For CI integrations, consider using a specific scan profile (ci-standard) and enforce max-risk thresholds as part of your pipeline.
Related MCP Servers
medusa
AI-first security scanner with 76 analyzers, 4,000+ detection rules, 508 FP filters (96.8% reduction), and 133 CVE detections for AI/ML, LLM agents, and MCP servers
mcp-manager
CLI tool for managing Model Context Protocol (MCP) servers in one place & using them across them different clients
mcp -memos-py
A Python package enabling LLM models to interact with the Memos server via the MCP interface for searching, creating, retrieving, and managing memos.
hop
Fast, elegant SSH connection manager with a TUI dashboard and MCP server
mcp -python-template
This template provides a streamlined foundation for building Model Context Protocol (MCP) servers in Python. It's designed to make AI-assisted development of MCP tools easier and more efficient.
mcptrust
Runtime security proxy for MCP: lockfile enforcement, drift detection, artifact pinning, Sigstore/Ed25519 signing, CEL policy, OpenTelemetry tracing. Works with Claude Desktop, LangChain, AutoGen, CrewAI.