Scan MCP servers. Check packages before installing. Audit dependencies. Verify repos. Runtime GO/CAUTION/BLOCK decisions. 8 tools, zero dependencies, one install.
Add to your Cursor or Claude Desktop config and start scanning.
Then ask your AI:
MCP server scanning, supply chain checks, and runtime decisions -- all from natural language.
Full OWASP MCP Top 10 scan of any MCP server endpoint. Tests authentication, input validation, rate limiting, and more.
Scan this MCP serverRisk-rate all exposed tools on a server. Flags dangerous capabilities like file system access, code execution, and network calls.
How risky is this server?Runtime GO/CAUTION/BLOCK decision for any MCP tool call. Evaluates the tool, arguments, and context before execution.
Should I make this call?Injection pattern detection across tool arguments. Catches prompt injection, SQL injection, command injection, and XSS patterns.
Are these arguments safe?Pre-install safety check for any npm or PyPI package. Checks age, maintainers, known vulnerabilities, and typosquatting signals.
Is litellm safe to install?Bulk dependency audit from package.json or requirements.txt. Checks every dependency against vulnerability databases in parallel.
Audit my package.jsonCVE database lookup for any package. Returns known vulnerabilities with severity ratings and fix versions.
Any CVEs for mcp-bridge?GitHub repo trust scoring. Checks stars, forks, contributors, license, recent activity, and open security advisories.
Is this repo safe?Test against our deliberately vulnerable MCP server.
Or install cybersecify and ask your AI to scan any server.
These are not hypothetical threats. Compromised packages, credential stealers, and typosquats are hitting AI developers every week. Cybersecify catches them before you install.
73% rise in malicious open-source packages year over year. — ReversingLabs 2026 Report
Built by contributors to the standards that define MCP security.
Section 7: Message Integrity & Replay Protection. Authored and merged into the official OWASP cheat sheet series.
Three Internet-Drafts on MCP and agent security submitted to the IETF. Standards-track specifications for the protocol layer.
Need runtime protection for production MCP deployments? See MCPSaaS.
Cybersecify checks known vulnerabilities from multiple sources. It does NOT perform source code analysis, zero-day detection, or runtime malware scanning.
CyberSecAI Ltd accepts no liability for any damage, loss, or security incident arising from reliance on scan results. Always perform independent security review before deploying to production.
Vulnerability data is sourced from third-party databases and may be incomplete or delayed. A clean scan does not guarantee the absence of security issues.
Cybersecify is provided as-is without warranty of any kind, express or implied.
Cybersecify is a product of CyberSecAI Ltd. It is not affiliated with, endorsed by, or associated with OWASP, IETF, Anthropic, or the Model Context Protocol project.