Server data from the Official MCP Registry
Thin MCP and CLI proxy for AI agent and MCP security auditing via a hosted backend
Thin MCP and CLI proxy for AI agent and MCP security auditing via a hosted backend
Valid MCP server (1 strong, 4 medium validity signals). 1 code issue detected. 3 known CVEs in dependencies (0 critical, 3 high severity) Package registry verified. Imported from the Official MCP Registry.
6 files analyzed · 5 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: AGENT_SECURITY_API_KEY
Environment variable: AGENT_SECURITY_BASE_URL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-joepangallo-mcp-audit-server": {
"env": {
"AGENT_SECURITY_API_KEY": "your-agent-security-api-key-here",
"AGENT_SECURITY_BASE_URL": "your-agent-security-base-url-here"
},
"args": [
"-y",
"ledd-mcp-audit-server"
],
"command": "npx"
}
}
}From the project's GitHub README.
Thin MCP server and CLI proxy for AI agent and MCP security auditing. It connects to a private audit API to analyze MCP configurations, test prompt injection resistance, trace data flows, scan packages, and generate security policies.
This package is a thin proxy. All scan logic lives in a private backend operated by you or your provider.
Managed hosted flow:
AGENT_SECURITY_API_KEYhttps://audit.leddconsulting.comSelf-hosted or private-network flow:
AGENT_SECURITY_BASE_URL to your HTTPS API originAGENT_SECURITY_HOST and AGENT_SECURITY_PORT for a loopback/private deploymentHosted backend access is not bundled with this package. If you want managed access or a licensed private deployment, contact Ledd Consulting.
ledd-mcp-audit-serverio.github.joepangallo/mcp-audit-servernpm install ledd-mcp-audit-server
Install package: ledd-mcp-audit-server
CLI command after install: mcp-audit-server
This is the public package that should be published to npm and listed in public MCP directories. The audit engine itself stays private.
The old package name mcp-server-agent-security is retired. See MIGRATION.md for upgrade steps and the deprecation plan.
Add to your MCP client configuration (Claude Desktop, Cursor, etc.):
{
"mcpServers": {
"mcp-audit-server": {
"command": "npx",
"args": ["-y", "ledd-mcp-audit-server", "--mcp"],
"env": {
"AGENT_SECURITY_API_KEY": "your-issued-api-key"
}
}
}
}
For a self-hosted backend, add AGENT_SECURITY_BASE_URL to that same env block.
The server exposes 10 tools over stdio:
| Tool | Description |
|---|---|
audit_mcp_config | Static analysis of MCP config JSON for privilege, auth, transport, and launch risks |
audit_mcp_server | Active probing of a running MCP server over stdio (requires AGENT_SECURITY_ADMIN_MODE=1) |
audit_agent_trust | Trust audit for tool permissions, execution provenance, secret exposure controls, policy drift, and deployment trust score |
audit_prompt_injection | Tests a system prompt against a 30+ payload injection catalog |
audit_agent_dataflow | Traces PII and secret exposure through an agent's tool pipeline |
scan_mcp_package | Scans an npm MCP package for dependency vulnerabilities and dangerous patterns |
generate_report | Combines multiple audit results into a composite report with executive summary |
fix_mcp_config | Auto-remediates config issues: removes unsafe flags, upgrades transport, redacts secrets |
harden_system_prompt | Appends injection-resistant guardrails to a system prompt |
generate_policy | Generates an enforceable JSON security policy from an MCP config |
The CLI forwards commands to the private audit API.
# Hosted quick start
export AGENT_SECURITY_API_KEY=your-issued-api-key
# Audit an MCP configuration file
mcp-audit-server scan-config ./claude_desktop_config.json
# Probe a live MCP server (requires AGENT_SECURITY_ADMIN_MODE=1)
mcp-audit-server scan-server npx -y @modelcontextprotocol/server-filesystem /tmp
# Audit trust posture and policy drift for an agent/MCP deployment
mcp-audit-server scan-trust ./claude_desktop_config.json ./claimed-policy.json
# Scan an npm package for vulnerabilities
mcp-audit-server scan-package @modelcontextprotocol/server-shell
# Test a system prompt for injection vulnerabilities
mcp-audit-server scan-injection ./system-prompt.txt
# Trace data flows through an MCP config
mcp-audit-server scan-dataflow ./claude_desktop_config.json
# Auto-fix security issues in an MCP config
mcp-audit-server fix-config ./claude_desktop_config.json
# Harden a system prompt against injection
mcp-audit-server harden-prompt ./system-prompt.txt
# Generate a security policy from an MCP config
mcp-audit-server generate-policy ./claude_desktop_config.json
# Retrieve a previous audit report
mcp-audit-server report <audit-id>
# Output raw JSON instead of formatted tables
mcp-audit-server scan-config ./config.json --json
# Start in MCP stdio server mode
mcp-audit-server --mcp
For a self-hosted backend, also set AGENT_SECURITY_BASE_URL=https://your-audit-host.
| Variable | Default | Description |
|---|---|---|
AGENT_SECURITY_BASE_URL | (none) | Full audit API origin, e.g. https://audit.example.com |
AGENT_SECURITY_HOST | 127.0.0.1 | Self-hosted/private-network audit API host |
AGENT_SECURITY_PORT | 3091 | Self-hosted/private-network audit API port |
AGENT_SECURITY_API_KEY | (none) | API key for authenticated access. If set with no endpoint overrides, the package uses https://audit.leddconsulting.com |
AGENT_SECURITY_REQUEST_TIMEOUT_MS | 15000 | Request timeout for CLI and MCP proxy calls |
AGENT_SECURITY_ADMIN_MODE | (none) | Set to 1 to enable active server probing |
https://audit.leddconsulting.com when AGENT_SECURITY_API_KEY is set. Use AGENT_SECURITY_BASE_URL for other hosted HTTPS deployments, or AGENT_SECURITY_HOST and AGENT_SECURITY_PORT for local/private-network deployments.MIT
Built by Ledd Consulting
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.
by Microsoft · Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace · Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm — conversationally
by mcp-marketplace · Finance
Free stock data and market news for any MCP-compatible AI assistant.