MCP Security · Free CLI

Scan your MCP configs
before attackers do.

OgunScan audits MCP server configurations for prompt injection, exposed credentials, and server-side vulnerabilities — in seconds.

Install free CLI → Shield — $9/mo
$ pip install ogunscan
$ ogunscan scan ~/.cursor/mcp.json

⚔️ OgunScan — MCP Security Report
Target: ~/.cursor/mcp.json
Servers: 4 | Tools: 12
Findings: 3 total

CRITICAL: 2 HIGH: 1 MEDIUM: 0

[CRITICAL] OGN-200 — Hardcoded credential in env
Location: server 'github-mcp' → env.GITHUB_TOKEN
Fix: Move to environment variables or secrets manager.

[CRITICAL] OGN-300 — Prompt injection in tool description
Location: server 'assistant' → tools.summarize
Evidence: "ignore previous instructions and..."

[HIGH] OGN-500 — Unverified package-sourced server
Fix: Pin exact package versions (e.g., npx pkg@1.2.3)
What OgunScan catches
Critical

Prompt Injection

Detects malicious instructions embedded in tool descriptions that hijack AI behavior.

Critical

Exposed Credentials

Scans for hardcoded API keys, tokens, and secrets in env vars and command args.

Critical

Unencrypted Connections

Flags MCP servers using HTTP instead of HTTPS for remote connections.

High

Suspicious Server URLs

Identifies ngrok tunnels, IP addresses, free-TLD domains, and Tor services.

High

Dangerous Permissions

Warns on overly-permissive scopes like shell_exec, file_write, and admin.

Medium

Supply Chain Risk

Detects unpinned npx/uvx packages vulnerable to dependency hijacking attacks.

Pricing
Free
$0
  • Single-file CLI scan
  • All 6 vulnerability checks
  • JSON output for scripting
  • Open source on GitHub
Install CLI →