MCPScanner (formerly known as mcpry
) is a command-line tool for analyzing MCP
servers. It does the following:
- Discovers MCP Servers: It automatically searches for MCP server configuration files in well-known locations on the host system.
- Analyzes Tools and Resources: It connects to each discovered server to fetch the list of available tools and resources.
- Security Scanning with Pangea AI Guard: It uses the Pangea AI Guard service to scan the tools for malicious entities and prompts.
- Generates Reports: It creates a JSON report (default
mcpscanner.json
) containing the analysis results. - Detects Changes: It can compare the current state of a server's tools with a previous report and display a diff if any changes are detected.
- Finds Similar Tools: It can identify tools with similar functionality.
pip install -U mcpscanner
Before using MCPScanner, you need to set the PANGEA_AI_GUARD_TOKEN
environment
variable to a Pangea API token that has access to the Pangea
AI Guard service.
export PANGEA_AI_GUARD_TOKEN="pts_your_token_here"
The primary command is scan
, which runs the analysis.
mcpscanner scan
Parameter | Description | Default |
---|---|---|
--input <PATH> |
The input file containing a previous report to compare against. | mcpscanner.json |
--output <PATH> |
The file where the new report will be saved. | mcpscanner.json |
--list-tools |
If set, the names of all tools for each MCP server will be listed in the output. | False |
--mcp-config-files <FILES> |
A list of files to discover MCP servers from. | A list of well-known paths for different operating systems. |
--similarity-threshold <FLOAT> |
The threshold (between 0.0 and 1.0) for two tools to be considered similar. | 0.96 |
--syntax-theme <THEME> |
The syntax theme to use for displaying JSON diffs. | github-dark |