Server data from the Official MCP Registry
AI security layer: code scanning, PII detection, prompt injection, secrets, CVEs
AI security layer: code scanning, PII detection, prompt injection, secrets, CVEs
Valid MCP server (1 strong, 1 medium validity signals). No known CVEs in dependencies. Package registry verified. Imported from the Official MCP Registry.
3 files analyzed · 1 issue found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: GUARDIANSHIELD_PROFILE
Environment variable: GUARDIANSHIELD_AUDIT_PATH
Environment variable: GUARDIANSHIELD_DEBUG
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-sparkvibe-io-guardianshield": {
"env": {
"GUARDIANSHIELD_DEBUG": "your-guardianshield-debug-here",
"GUARDIANSHIELD_PROFILE": "your-guardianshield-profile-here",
"GUARDIANSHIELD_AUDIT_PATH": "your-guardianshield-audit-path-here"
},
"args": [
"guardianshield"
],
"command": "uvx"
}
}
}From the project's GitHub README.
Universal AI security layer — an open-source MCP server for code scanning, PII detection, prompt injection defense, secret detection, dependency auditing, and audit logging.
Zero dependencies · 27 MCP tools · 5 safety profiles · 108+ detection patterns
pip install guardianshield
# Register with Claude Code
claude mcp add guardianshield -- guardianshield-mcp
# Or run directly
guardianshield-mcp
# Claude Code
claude mcp add guardianshield -- guardianshield-mcp
# VS Code (.vscode/mcp.json)
{"servers": {"guardianshield": {"type": "stdio", "command": "guardianshield-mcp"}}}
# Cursor (.cursor/mcp.json)
{"mcpServers": {"guardianshield": {"command": "guardianshield-mcp"}}}
# Claude Desktop (claude_desktop_config.json)
{"mcpServers": {"guardianshield": {"command": "guardianshield-mcp"}}}
| Tool | Description |
|---|---|
scan_code | Scan source code for vulnerabilities and hardcoded secrets |
scan_file | Scan a single file (auto-detects language from extension) |
scan_directory | Recursively scan a directory with filtering and progress streaming |
scan_input | Check user/agent input for prompt injection attempts |
scan_output | Check AI output for PII leaks and content violations |
check_secrets | Detect hardcoded secrets and credentials |
scan_files | Scan multiple files in one call |
scan_diff | Parse unified diff and scan only added lines |
| Tool | Description |
|---|---|
check_dependencies | Check packages for known CVEs via OSV.dev (PyPI, npm, Go, Packagist) |
sync_vulnerabilities | Sync the local OSV vulnerability database |
parse_manifest | Parse any supported manifest file (11 formats) into dependency objects |
scan_dependencies | Scan a directory for manifest files and check all deps for vulnerabilities |
| Tool | Description |
|---|---|
mark_false_positive | Mark a finding as false positive (flags future matches) |
list_false_positives | List active false positive records with optional filter |
unmark_false_positive | Remove a false positive record by fingerprint |
| Tool | Description |
|---|---|
list_engines | List available analysis engines with capabilities |
set_engine | Set active analysis engines for code scanning |
Three engines ship built-in: regex (line-by-line pattern matching, enabled by default), deep (cross-line taint tracking), and semantic (structure-aware confidence adjustment).
| Tool | Description |
|---|---|
export_sarif | Export findings as SARIF 2.1.0 JSON for GitHub Code Scanning and CI |
save_baseline | Save current findings as a baseline for delta scanning |
scan_with_baseline | Scan code and report only new findings vs. baseline |
check_quality_gate | Evaluate findings against severity thresholds (pass/fail/warn) |
scan_files | Scan multiple files in one call |
scan_diff | Parse unified diff and scan only added lines |
| Tool | Description |
|---|---|
get_profile | Get current safety profile configuration |
set_profile | Switch safety profile (general, education, healthcare, finance, children) |
test_pattern | Test a regex pattern against sample code for custom pattern development |
audit_log | Query the security audit log |
get_findings | Retrieve past findings with filters |
shield_status | Get health, configuration, and OSV cache statistics |
Set environment variables to customize behavior:
| Variable | Description | Default |
|---|---|---|
GUARDIANSHIELD_PROFILE | Default safety profile | general |
GUARDIANSHIELD_AUDIT_PATH | Path to SQLite audit database | ~/.guardianshield/audit.db |
GUARDIANSHIELD_DEBUG | Enable debug logging (1) | disabled |
Full documentation: sparkvibe-io.github.io/GuardianShield
Apache 2.0
Be the first to review this server!
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.
by Microsoft · Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace · Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm — conversationally
by mcp-marketplace · Finance
Free stock data and market news for any MCP-compatible AI assistant.
by Taylorwilsdon · Productivity
Control Gmail, Calendar, Docs, Sheets, Drive, and more from your AI