SafeAI
Agentic Security · SafeAI Suite

MCP Security Scanner

Scans Model Context Protocol server tool schemas for injection surfaces, privilege boundary gaps, authentication weaknesses, and tool-chain attack paths. Maps findings to OWASP Agentic AI T-codes and feeds the Exploitability (E) variable in your TIVM assessment.

OWASP Agentic AI T1–T15
Feeds TIVM E variable
Pre-populates ALIGN L3/L4 attacks
Configure scan

MCP server target

Staging only: This scanner sends tool discovery and probe requests to your MCP endpoint. Only point it at a staging or development server — never production. The Anthropic API is used to analyse tool schemas and generate targeted attack payloads.
How it works

Four scan modules

Module 1 — Injection surface analysis

Are tool descriptions injection vectors?

Tool descriptions and parameter schemas are read by the LLM as part of tool selection. If a description contains instruction-like language, an attacker who controls a tool name or description can inject into the model's reasoning. Each tool schema is analysed for embedded instructions, override phrases, and authority claims. Maps to OWASP T3 Prompt Injection

Module 2 — Privilege boundary check

Can tools access more than they should?

Each tool's declared parameter scope is compared against likely data access patterns. Tools with write access, external network calls, or cross-system effects that lack explicit scope constraints are flagged. Identifies confused deputy paths before they are exploited. Maps to OWASP T1 Privilege Escalation

Module 3 — Tool-chain attack paths

What can be achieved by combining tools?

Individually safe tools can be combined to achieve outcomes neither was designed for. The scanner maps tool combinations and flags paths where chaining two or more tools produces a high-impact action — data exfiltration, privilege escalation, or recursive consumption. Maps to OWASP T7 Unsafe Actuation

Module 4 — Authentication gap detection

Are tool invocations authenticated?

MCP tools that do not require caller authentication, do not validate the calling agent's identity, or do not enforce scope-bounded tokens are vulnerable to impersonation and confused deputy attacks. Maps to OWASP T9 Credential Theft

Framework alignment

OWASP Agentic AI Top 10 — coverage map