loaditout.ai
SkillsPacksTrendingLeaderboardAPI DocsBlogSubmitRequestsCompareAgentsXPrivacyDisclaimer
{}loaditout.ai
Skills & MCPPacksBlog

mcp-guard

MCP Tool

InnerWarden/mcp-guard

Runtime security for MCP servers and AI agents. Pre-execution guardrails, tool call inspection, drift detection. Rust, open source.

Install

$ npx loaditout add InnerWarden/mcp-guard

Platform-specific configuration:

.claude/settings.json
{
  "mcpServers": {
    "mcp-guard": {
      "command": "npx",
      "args": [
        "-y",
        "mcp-guard"
      ]
    }
  }
}

Add the config above to .claude/settings.json under the mcpServers key.

About

MCP Guard

[](https://github.com/InnerWarden/mcp-guard/actions/workflows/ci.yml) [](LICENSE)

Runtime security proxy for MCP servers and AI agents. Inspects tool calls before they execute, blocks command injection, path traversal, SSRF, tool poisoning, and rug-pull attacks. Hash-chained audit trail.

cargo install --git https://github.com/InnerWarden/mcp-guard
How it works

MCP Guard sits between AI agents and MCP servers as a transparent proxy. Every tool call is inspected against security rules before reaching the server.

Agent (Claude, Cursor, etc.)
  │
  ▼
┌─────────────┐
│  MCP Guard  │ ← inspect + block + audit
└─────────────┘
  │
  ▼
MCP Server (filesystem, database, API, etc.)

Stdio mode (wrap an MCP server):

mcp-guard --upstream-cmd "npx @modelcontextprotocol/server-filesystem /home/user"

TCP mode (proxy to a remote MCP server):

mcp-guard --listen 127.0.0.1:3100 --upstream tcp://localhost:3200
Built-in rules

| ID | Rule | Action | Severity | |----|------|--------|----------| | MG-01 | Command injection in tool arguments | Block | Critical | | MG-02 | Path traversal in tool arguments | Block | Critical | | MG-03 | SSRF in tool arguments | Block | High | | MG-04 | Hidden/zero-width characters in tool description | Alert | High | | MG-05 | Tool description changed (rug-pull detection) | Block | Critical | | MG-06 | Encoded payload in tool arguments | Alert | Medium | | MG-07 | Prompt injection markers in tool response | Sanitize | High | | MG-08 | Tool call rate limit | Block | Medium |

What it detects

Command injection — semicolons, backticks, $(), pipes to shells, eval(), exec(), system(), file redirects to sensitive paths.

Path traversal — ../, /etc/passwd, /etc/shadow, ~/.ssh/, /proc/self/, URL-encoded variants.

Tags

ai-agentsmcpmcp-serverprompt-injectionruntime-securityrustsecuritytool-poisoning

Reviews

Loading reviews...

Quality Signals

0
Installs
Last updated22 days ago
Security: AREADME

Safety

Risk Levelmedium
Data Access
read
Network Accessnone

Details

Sourcegithub-crawl
Last commit3/28/2026
View on GitHub→

Embed Badge

[![Loaditout](https://loaditout.ai/api/badge/InnerWarden/mcp-guard)](https://loaditout.ai/skills/InnerWarden/mcp-guard)