MCP Servers

模型上下文协议服务器、框架、SDK 和模板的综合目录。

Supply chain security scanner for MCP servers. Detect typosquats, CVEs, credential leaks, and dangerous permissions in your AI agent configs.

创建于 2/18/2026
更新于 6 days ago
Repository documentation and setup instructions

⛨ MCPShield

MCP Supply Chain Security Scanner — detect vulnerabilities, typosquats, and misconfigurations in your MCP server configs before they reach production.

Think "Snyk for MCP servers."

What It Does

MCPShield scans your MCP configuration files (Claude Desktop, Cursor, VS Code, etc.) and detects:

  • Typosquat packages — Levenshtein distance analysis against 40+ known legitimate MCP packages, plus a database of confirmed malicious packages
  • Known CVEs — checks every server against a vulnerability database of disclosed MCP security issues (CVE-2025-68145, etc.)
  • Hardcoded credentials — API keys, database URLs, tokens, private keys embedded in config files
  • Dangerous permissions — system directory access, disabled sandboxes, unrestricted file access
  • Unverified publishers — flags packages not from trusted scopes (@anthropic/, @modelcontextprotocol/, etc.)
  • Transport security — HTTP endpoints, missing authentication on SSE connections

Quick Start

# Scan a specific config file
node src/index.js scan --config path/to/claude_desktop_config.json

# Auto-discover and scan all MCP configs on your system
node src/index.js scan

# Output JSON for CI/CD pipelines
node src/index.js scan --config mcp.json --json

# Save report to file
node src/index.js scan --config mcp.json --json --output report.json

Install Globally (optional)

npm link
mcpshield scan

CI/CD Integration

MCPShield uses exit codes for pipeline integration:

| Exit Code | Meaning | |-----------|---------| | 0 | No high/critical findings — safe to proceed | | 1 | High-severity findings detected | | 2 | Critical findings (typosquats, RCE, credential exposure) |

GitHub Actions Example

- name: MCP Security Scan
  run: |
    npx mcpshield scan --config .cursor/mcp.json --json --output mcpshield-report.json
  continue-on-error: false

- name: Upload Security Report
  if: always()
  uses: actions/upload-artifact@v4
  with:
    name: mcpshield-report
    path: mcpshield-report.json

Config File Locations

MCPShield auto-discovers configs from:

| Client | Location | |--------|----------| | Claude Desktop (macOS) | ~/Library/Application Support/Claude/claude_desktop_config.json | | Claude Desktop (Windows) | %APPDATA%/Claude/claude_desktop_config.json | | Claude Desktop (Linux) | ~/.config/claude/claude_desktop_config.json | | Cursor | ~/.cursor/mcp.json or .cursor/mcp.json | | Windsurf | ~/.windsurf/mcp.json | | VS Code | .vscode/mcp.json | | Continue | ~/.continue/config.json |

Example Output

  ╔═══════════════════════════════════════════╗
  ║                                           ║
  ║   ⛨  MCPShield v0.1.0                     ║
  ║   MCP Supply Chain Security Scanner        ║
  ║                                           ║
  ╚═══════════════════════════════════════════╝

─── SCANNING: User-specified ──────────────────────────

📦 github (mcp-servr-github)
  🛑 MALICIOUS PACKAGE DETECTED
  Typosquat — contains credential-harvesting payload
  Impersonates: mcp-server-github (distance: 1)
  ↳ REMOVE THIS SERVER IMMEDIATELY

   1.  CRITICAL  MALICIOUS: Typosquat — contains credential-harvesting payload
      Confidence: confirmed | Distance: 1 | Method: single character difference
      ↳ Remove this server and replace with the legitimate package.

─── SCAN SUMMARY ──────────────────────────────────────

  Servers scanned:  8
  Total findings:   18

   CRITICAL   7 findings
   HIGH       6 findings
   MEDIUM     5 findings

  ⛨ 1 typosquat(s) detected — immediate action required
  ⚠ 3 server(s) from unverified publishers

Try It

Test with the included vulnerable config:

node src/index.js scan --config examples/vulnerable-config.json

Test with a clean config:

node src/index.js scan --config examples/clean-config.json

Architecture

mcpshield-cli/
├── src/
│   ├── index.js          # CLI entry point & orchestrator
│   ├── config.js         # Config discovery & parsing
│   ├── typosquat.js      # Typosquat detection (Levenshtein + known malicious DB)
│   ├── credentials.js    # Credential & permission scanning
│   ├── cvecheck.js       # CVE database matching
│   └── output.js         # Terminal formatting & report generation
├── data/
│   └── vulndb.js         # Vulnerability database, known packages, credential patterns
├── examples/
│   ├── vulnerable-config.json    # Test config with intentional issues
│   └── clean-config.json         # Clean config for comparison
└── package.json

Roadmap

  • [ ] npm registry live lookup (verify package exists, check download counts)
  • [ ] Real-time CVE feed integration (NVD, GitHub Advisory Database)
  • [ ] MCP server runtime behavioral analysis
  • [ ] Config file watcher (continuous monitoring)
  • [ ] VS Code extension
  • [ ] GitHub App for PR checks
  • [ ] Policy-as-code engine (OPA/Rego)

License

MIT

快速设置
此服务器的安装指南

安装包 (如果需要)

npx @modelcontextprotocol/server-mcpshield

Cursor 配置 (mcp.json)

{ "mcpServers": { "mcpshield-mcpshield": { "command": "npx", "args": [ "mcpshield-mcpshield" ] } } }