You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/mcp-scan/index.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ icon: bootstrap/shield-check
10
10
Use MCP-scan to safeguard your MCP integrations.
11
11
</div>
12
12
13
-
[MCP-scan](https://github.com/invariantlabs-ai/mcp-scan) is a security scanning tool, that uses Invariant's security stack, to ensure the MCP integrations you are using in MCP clients such as Cursor, Claude and Windsurf are safe.
13
+
[MCP-scan](https://github.com/invariantlabs-ai/mcp-scan) is a security scanning tool that uses Invariant's security stack to ensure the MCP integrations you are using in MCP clients, such as Cursor, Claude, and Windsurf are safe.
@@ -19,7 +19,7 @@ Use MCP-scan to safeguard your MCP integrations.
19
19
- Scanning of Claude, Cursor, Windsurf, and other file-based MCP client configurations
20
20
- Scanning for prompt injection attacks in tool descriptions and [tool poisoning attacks](https://invariantlabs.ai/blog/mcp-security-notification-tool-poisoning-attacks) using [Guardrails](https://github.com/invariantlabs-ai/invariant?tab=readme-ov-file#analyzer)
21
21
- Live runtime monitoring of MCP traffic using `mcp-scan proxy`
22
-
-_MCP guardrailing_ of tool calls and responses, including PII detection, secrets detection, tool restrictions and [custom guardrailing policies](./guardrails)
22
+
-_MCP guardrailing_ of tool calls and responses, including PII detection, secrets detection, tool restrictions, and [custom guardrailing policies](./guardrails)
23
23
- Detection of cross-origin escalation attacks ([tool shadowing](https://invariantlabs.ai/blog/mcp-security-notification-tool-poisoning-attacks))
24
24
-_Tool Pinning_ to detect and prevent [MCP rug pull attacks](https://invariantlabs.ai/blog/mcp-security-notification-tool-poisoning-attacks), i.e. detects changes to MCP tools via hashing
25
25
@@ -45,7 +45,7 @@ Recognizing these serious security threats, we developed **MCP-Scan** to help us
45
45
46
46
## Using MCP-Scan
47
47
48
-
MCP-scan offers two primary modes of operations, allowing you to identify security vulnerabilities in your MCP integrations and continously monitor your MCP traffic.
48
+
MCP-scan offers two primary modes of operations, allowing you to identify security vulnerabilities in your MCP integrations and continuously monitor your MCP traffic.
49
49
50
50
51
51
<!-- * [_Server Scanning_](./scanning.md) with **`mcp-scan scan`** -->
@@ -64,7 +64,7 @@ Learn more about the scanning mode in the [MCP Server Scanning](./scanning.md) c
64
64
65
65
### Active Proxying with **`mcp-scan proxy`**
66
66
67
-
Using `mcp-scan proxy`, you can monitor, log and safeguard all MCP traffic on your machine. This allows you to inspect the runtime behavior of agents and tools, and prevent attacks from e.g. untrusted sources (like websites or emails) that may try to exploit your agents. `mcp-scan proxy` is a dynamic security layer that runs in the background, and continuously monitors your MCP traffic.
67
+
Using `mcp-scan proxy`, you can monitor, log, and safeguard all MCP traffic on your machine. This allows you to inspect the runtime behavior of agents and tools, and prevent attacks from e.g., untrusted sources (like websites or emails) that may try to exploit your agents. `mcp-scan proxy` is a dynamic security layer that runs in the background, and continuously monitors your MCP traffic.
68
68
69
69
<br/>
70
70
@@ -78,7 +78,7 @@ Learn more about the proxying mode in the [MCP Proxying with mcp-scan](./proxyin
78
78
## Including MCP-scan results in your own project / registry
79
79
80
80
If you want to include MCP-scan results in your own project or registry, please reach out to the team via `[email protected]`, and we can help you with that.
81
-
For automated scanning we recommend using the `--json` flag and parsing the output.
81
+
For automated scanning, we recommend using the `--json` flag and parsing the output.
0 commit comments