mcp-security-inspector
一个用于检测Model Context Protocol (MCP)安全性的Chrome扩展工具。
claude mcp add --transport stdio purpleroc-mcp-security-inspector npm run build:extension \ --env NODE_ENV="production" \ --env EXT_BUILD_MODE="extension"
How to use
MCP Security Inspector is an AI-enhanced Chrome extension designed to securely inspect MCP servers by integrating active scanning and passive monitoring with multiple LLM services. After installing and loading the unpacked extension, you can connect the extension to an MCP server by entering the server URL or address in the extension’s MCP panel, followed by any required authentication details. Once connected, you can enable either Active Scan mode to generate targeted test cases and run dynamic security tests, or Passive Monitoring mode to observe real-time MCP calls and flag potential vulnerabilities as they occur. The extension supports configuring multiple LLM providers (OpenAI, Claude, Gemini, or local Ollama) to power the analysis, and you can test connections to these services by supplying API keys and endpoint configurations.
Within the extension, you’ll find tools organized under the MCP components: tools, prompts, and resources. For each component type you can run unified security checks, view detailed reports, and export findings. Use the reporting feature to assess risk levels, review remediation suggestions, and track history across scans. The UI provides bilingual (English/Chinese) support, with real-time progress indicators during scans and a centralized dashboard to compare results across different MCP components and configurations.
How to install
Prerequisites:
- Node.js and npm installed on your development machine
- Git installed
- Optional: Chrome browser for testing the extension
Install steps:
-
Clone the repository git clone https://github.com/purpleroc/mcp-security-inspector.git cd mcp-security-inspector
-
Install dependencies npm install
-
Build the Chrome extension package npm run build:extension
-
Load the unpacked extension into Chrome
- Open Chrome and navigate to chrome://extensions/
- Enable Developer mode
- Click "Load unpacked" and select the dist folder produced by the build
-
Connect to an MCP server
- Open the extension's MCP panel
- Enter the MCP server address and authentication details if required
- Choose detection mode (Active Scan or Passive Monitoring) and configure detection rules
Prerequisites recap:
- A running MCP server you want to inspect
- API keys/configs for any LLM providers you intend to use
- A Chrome environment to load the extension during testing
Additional notes
Tips and notes:
- If you encounter CORS or extension loading issues, ensure you loaded the correct dist directory and that Developer mode is enabled in Chrome.
- When using LLM providers, keep API keys secure and consider enabling environment-specific configurations to separate development and production keys.
- The extension supports exporting reports; use this to maintain audit trails for compliance or remediation tracking.
- If your MCP server uses self-signed certificates, ensure the extension has appropriate network permissions and that the server URL is accessible from your development environment.
- Common env vars to consider adding: MCP_SERVER_URL (server endpoint), LLM_OPENAI_API_KEY, LLM_CLAUDE_API_KEY, LLM_GEMINI_API_KEY, EXT_BUILD_MODE (used during development vs production).
Related MCP Servers
supermemory
Your memories are in ChatGPT... But nowhere else. Universal Memory MCP makes your memories available to every single LLM. No logins or paywall. One command to set it up.
obsidian -tools
Add Obsidian integrations like semantic search and custom Templater prompts to Claude or any MCP client.
Security-Detections
MCP to help Defenders Detection Engineer Harder and Smarter
MCP-Defender
Desktop app that automatically scans and blocks malicious MCP traffic in AI apps like Cursor, Claude, VS Code and Windsurf.
mcp
Octopus Deploy Official MCP Server
furi
CLI & API for MCP management