Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Quick Start

Discover Your MCP Servers

First, see what MCP servers are configured across your AI tools:

mcp-scanner list

This scans configurations for Claude Desktop, Cursor, Windsurf, Zed, and other supported clients.

Run a Security Scan

Scan all discovered servers:

mcp-scanner scan

Or scan a specific client’s servers:

mcp-scanner scan --client claude

Or scan a specific server command:

mcp-scanner scan --server "npx -y @modelcontextprotocol/server-filesystem /"

Understanding Results

Scan results show threats by severity:

  • CRITICAL: Immediate action required (e.g., prompt injection in remote servers)
  • HIGH: Significant security risk (e.g., description drift, broad permissions)
  • MEDIUM: Moderate risk worth reviewing (e.g., new tools added)
  • LOW: Minor issues or informational (e.g., tools removed)
  • INFO: Non-actionable information

Each threat includes:

  • A description of the issue
  • Evidence from the server configuration
  • Remediation steps

Output Formats

# Default table format
mcp-scanner scan

# JSON for scripting
mcp-scanner scan --output json

# SARIF for CI integration
mcp-scanner scan --output sarif > results.sarif

Start the Dashboard

For a visual interface:

mcp-scanner serve

This opens a web dashboard at http://localhost:9191 where you can:

  • View scan results
  • Browse audit logs
  • Manage proxy rules

Next Steps