MCP Servers

A collection of Model Context Protocol servers, templates, tools and more.

Security scanner for Model Context Protocol (MCP) with capability graph analysis. Detects emergent attack chains across multi-server AI agent deployments that no individual tool scan can find.

Created 3/19/2026
Updated about 5 hours ago
Repository documentation and setup instructions

MCP-Lattice

Open-source MCP security scanner with capability graph analysis.

Go Report Card License Release

The Problem

The Model Context Protocol (MCP) ecosystem has grown to over 10,000 servers, yet there is no comprehensive security tool to audit them. At least 25 CVEs and disclosure reports have documented vulnerabilities across tool poisoning, prompt injection, SSRF, and auth bypass classes. Existing scanners cover only a fraction of the attack surface and none analyze cross-server attack chains. MCP-Lattice fills that gap.

What MCP-Lattice Does

  • Auto-discovers MCP configurations for Claude Desktop, Cursor, Windsurf, VS Code, and Gemini CLI
  • 34 detection templates covering prompt injection, tool poisoning, code execution, auth bypass, data exfiltration, supply chain, privilege escalation, and DoS
  • 4-layer detection pipeline: L1 Pattern matching (<1ms), L2 Semantic analysis (~20ms), L3 Capability graph (~50ms), L4 Causal/LLM (planned)
  • 4 output formats: terminal table, JSON, SARIF (for CI/CD), and HTML

Quick Start

Install

go install github.com/panavinsingh/MCP-Lattice/cmd/mcp-lattice@latest

Or download a prebuilt binary from the releases page.

Run

mcp-lattice scan                                    # auto-discover and scan all MCP servers
mcp-lattice scan --config ~/.config/claude/claude_desktop_config.json  # scan a specific config
mcp-lattice scan --format sarif -o results.sarif    # SARIF output for CI
mcp-lattice scan --severity high                    # only high and critical findings

What It Finds

  • Tool poisoning with hidden instructions
  • Prompt injection via tool descriptions and parameters
  • SSRF-prone parameters with no allowlists
  • Zero-auth servers exposed to the network
  • Toxic tool combinations across servers
  • Data exfiltration paths (filesystem to HTTP)
  • Privilege escalation through capability chaining
  • Supply chain risks in server dependencies

Capability Graph Analysis

MCP-Lattice builds a capability graph across all configured MCP servers, modeling what each tool can read, write, execute, and transmit. It then searches for cross-server attack chains -- for example, a filesystem-read tool on one server combined with an HTTP-send tool on another creates an exfiltration path. This is the key differentiator: no other scanner detects multi-server toxic combinations.

Results

We scanned 100 MCP servers from the npm registry:

| Metric | Value | |---|---| | Total findings | 1,275 (759 Critical, 505 High, 11 Medium) | | Cross-server attack chains | 1,082 (84.9% of findings) | | Servers with findings | 45.3% | | False positive rate | 0% | | Top vulnerable servers | Heroku (116), Notion (94), CircleCI (89), Salesforce (55) |

Contributing

We welcome contributions -- especially new detection templates, which are the easiest way to get started.

Documentation

License

Apache License 2.0. See LICENSE for the full text.

Quick Setup
Installation guide for this server

Installation Command (package not published)

git clone https://github.com/panavinsingh/MCP-Lattice
Manual Installation: Please check the README for detailed setup instructions and any additional dependencies required.

Cursor configuration (mcp.json)

{ "mcpServers": { "panavinsingh-mcp-lattice": { "command": "git", "args": [ "clone", "https://github.com/panavinsingh/MCP-Lattice" ] } } }