CI/CD Integration
mcp-scanner can be integrated into your CI/CD pipeline to catch security issues before deployment.
SARIF Output
mcp-scanner supports SARIF (Static Analysis Results Interchange Format), which is compatible with GitHub Code Scanning, Azure DevOps, and other tools.
mcp-scanner scan --output sarif > results.sarif
GitHub Actions
name: MCP Security Scan
on:
push:
paths:
- '.vscode/mcp.json'
- 'mcp.json'
pull_request:
paths:
- '.vscode/mcp.json'
- 'mcp.json'
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Install mcp-scanner
run: cargo install mcp-scanner
- name: Run security scan
run: mcp-scanner scan --config .vscode/mcp.json --output sarif > results.sarif
- name: Upload SARIF results
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: results.sarif
Exit Codes
| Code | Meaning |
|---|---|
| 0 | No critical or high severity threats |
| 1 | Critical or high severity threats found |
| 2 | Error during scanning |
Fail on Severity
Use jq to fail on specific severities:
mcp-scanner scan --output json | jq -e '.threats | map(select(.severity == "critical" or .severity == "high")) | length == 0'
Pre-commit Hook
#!/bin/bash
# .git/hooks/pre-commit
if [ -f ".vscode/mcp.json" ]; then
mcp-scanner scan --config .vscode/mcp.json
if [ $? -ne 0 ]; then
echo "MCP security issues found. Fix them before committing."
exit 1
fi
fi