Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Security scanner for AI packages — MCP server + CLI <div align="center"> <img src="https://www.agentaudit.dev/banner-chameleon.png" alt="AgentAudit -- Security scanner for AI packages" width="100%"> <br> 🛡️ AgentAudit **Security scanner for AI packages — MCP server + CLI** Scan MCP servers, AI skills, and packages for vulnerabilities, prompt injection, and supply chain attacks. Powered by regex static analysis and deep LLM audits. $1 $1 $1 $1 </div> --- 📑 Table of C Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
agentaudit is best for security, audit, mcp workflows where MCP compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB MCP, runtime-metrics, public facts pack
Security scanner for AI packages — MCP server + CLI <div align="center"> <img src="https://www.agentaudit.dev/banner-chameleon.png" alt="AgentAudit -- Security scanner for AI packages" width="100%"> <br> 🛡️ AgentAudit **Security scanner for AI packages — MCP server + CLI** Scan MCP servers, AI skills, and packages for vulnerabilities, prompt injection, and supply chain attacks. Powered by regex static analysis and deep LLM audits. $1 $1 $1 $1 </div> --- 📑 Table of C
Public facts
4
Change events
0
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
MCP
Freshness
Feb 25, 2026
Vendor
Agentaudit
Artifacts
0
Benchmarks
0
Last release
3.9.13
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/starbuck100/agentaudit-mcp.gitSetup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Agentaudit
Protocol compatibility
MCP
Adoption signal
2 GitHub stars
Handshake status
UNKNOWN
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
bash
# Install globally (or use npx agentaudit) npm install -g agentaudit # Discover MCP servers configured in your AI editors agentaudit # Quick scan — clones repo, checks code with regex patterns (~2s) agentaudit scan https://github.com/owner/repo # Deep audit — clones repo, sends code to LLM for 3-pass analysis (~30s) agentaudit audit https://github.com/owner/repo # Registry lookup — check if a package has been audited before (no cloning) agentaudit lookup fastmcp
text
AgentAudit v3.9.8 Security scanner for AI packages Discovering MCP servers in your AI editors... • Scanning Cursor ~/.cursor/mcp.json found 3 servers ├── tool supabase-mcp ✔ ok │ SAFE Risk 0 https://agentaudit.dev/skills/supabase-mcp ├── tool browser-tools-mcp ✔ ok │ ⚠ not audited Run: agentaudit audit https://github.com/nichochar/browser-tools-mcp └── tool filesystem ✔ ok │ SAFE Risk 0 https://agentaudit.dev/skills/filesystem Looking for general package scanning? Try `pip audit` or `npm audit`.
json
{
"mcpServers": {
"agentaudit": {
"command": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
}
}json
{
"mcpServers": {
"agentaudit": {
"command": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
}
}json
{
"mcpServers": {
"agentaudit": {
"command": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
}
}json
{
"servers": {
"agentaudit": {
"command": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
}
}Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB MCP
Editorial quality
ready
Security scanner for AI packages — MCP server + CLI <div align="center"> <img src="https://www.agentaudit.dev/banner-chameleon.png" alt="AgentAudit -- Security scanner for AI packages" width="100%"> <br> 🛡️ AgentAudit **Security scanner for AI packages — MCP server + CLI** Scan MCP servers, AI skills, and packages for vulnerabilities, prompt injection, and supply chain attacks. Powered by regex static analysis and deep LLM audits. $1 $1 $1 $1 </div> --- 📑 Table of C
Security scanner for AI packages — MCP server + CLI
Scan MCP servers, AI skills, and packages for vulnerabilities, prompt injection, and supply chain attacks. Powered by regex static analysis and deep LLM audits.
</div>AgentAudit is a security scanner purpose-built for the AI package ecosystem. It works in two modes:
agentaudit in your terminal to discover and scan MCP servers installed in your AI editorsIt checks packages against the AgentAudit Trust Registry — a shared, community-driven database of security findings — and can perform local scans ranging from fast regex analysis to deep LLM-powered 3-pass audits.
# Install globally (or use npx agentaudit)
npm install -g agentaudit
# Discover MCP servers configured in your AI editors
agentaudit
# Quick scan — clones repo, checks code with regex patterns (~2s)
agentaudit scan https://github.com/owner/repo
# Deep audit — clones repo, sends code to LLM for 3-pass analysis (~30s)
agentaudit audit https://github.com/owner/repo
# Registry lookup — check if a package has been audited before (no cloning)
agentaudit lookup fastmcp
Example output:
AgentAudit v3.9.8
Security scanner for AI packages
Discovering MCP servers in your AI editors...
• Scanning Cursor ~/.cursor/mcp.json found 3 servers
├── tool supabase-mcp ✔ ok
│ SAFE Risk 0 https://agentaudit.dev/skills/supabase-mcp
├── tool browser-tools-mcp ✔ ok
│ ⚠ not audited Run: agentaudit audit https://github.com/nichochar/browser-tools-mcp
└── tool filesystem ✔ ok
│ SAFE Risk 0 https://agentaudit.dev/skills/filesystem
Looking for general package scanning? Try `pip audit` or `npm audit`.
Add AgentAudit as an MCP server — your AI agent can then discover, scan, and audit packages using its own LLM. No extra API key needed.
<details> <summary><strong>Claude Desktop</strong> — <code>~/.claude/mcp.json</code></summary>{
"mcpServers": {
"agentaudit": {
"command": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
}
}
</details>
<details>
<summary><strong>Cursor</strong> — <code>.cursor/mcp.json</code> (project) or <code>~/.cursor/mcp.json</code> (global)</summary>
{
"mcpServers": {
"agentaudit": {
"command": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
}
}
</details>
<details>
<summary><strong>Windsurf</strong> — <code>~/.codeium/windsurf/mcp_config.json</code></summary>
{
"mcpServers": {
"agentaudit": {
"command": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
}
}
</details>
<details>
<summary><strong>VS Code</strong> — <code>.vscode/mcp.json</code></summary>
{
"servers": {
"agentaudit": {
"command": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
}
}
</details>
<details>
<summary><strong>Continue.dev</strong> — <code>~/.continue/config.json</code></summary>
Add to the mcpServers section of your existing config:
{
"mcpServers": [
{
"name": "agentaudit",
"command": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
]
}
</details>
<details>
<summary><strong>Zed</strong> — <code>~/.config/zed/settings.json</code></summary>
{
"context_servers": {
"agentaudit": {
"command": {
"path": "npx",
"args": ["-y", "agentaudit", "--stdio"]
}
}
}
}
</details>
Then ask your agent: "Check which MCP servers I have installed and audit any unaudited ones."
| Command | Description | Example |
|---------|-------------|---------|
| agentaudit | Discover MCP servers (default, same as discover) | agentaudit |
| agentaudit discover | Find MCP servers in Cursor, Claude, VS Code, Windsurf | agentaudit discover |
| agentaudit discover --quick | Discover + auto-scan all servers | agentaudit discover --quick |
| agentaudit discover --deep | Discover + interactively select servers to deep-audit | agentaudit discover --deep |
| agentaudit scan <url> | Quick regex-based static scan (~2s) | agentaudit scan https://github.com/owner/repo |
| agentaudit scan <url> --deep | Deep audit (same as audit) | agentaudit scan https://github.com/owner/repo --deep |
| agentaudit audit <url> | Deep LLM-powered 3-pass audit (~30s) | agentaudit audit https://github.com/owner/repo |
| agentaudit lookup <name> | Look up package in trust registry | agentaudit lookup fastmcp |
| agentaudit setup | Register agent + configure API key | agentaudit setup |
| Flag | Description |
|------|-------------|
| --json | Output machine-readable JSON to stdout |
| --quiet / -q | Suppress banner and decorative output (show findings only) |
| --no-color | Disable ANSI colors (also respects NO_COLOR env var) |
| --help / -h | Show help text |
| -v / --version | Show version |
| Code | Meaning |
|------|---------|
| 0 | Clean — no findings detected, or successful lookup |
| 1 | Findings detected |
| 2 | Error (clone failed, network error, invalid args) |
| | Quick Scan (scan) | Deep Audit (audit) |
|---|---------------------|---------------------|
| Speed | ~2 seconds | ~30 seconds |
| Method | Regex pattern matching | LLM-powered 3-pass analysis |
| API key needed | No | Yes (ANTHROPIC_API_KEY or OPENAI_API_KEY) |
| False positives | Higher (regex limitations) | Very low (context-aware) |
| Detects | Common patterns (injection, secrets, eval) | Complex attack chains, AI-specific threats, obfuscation |
| Best for | Quick triage, CI pipelines | Critical packages, pre-production review |
Tip: Use agentaudit scan <url> --deep to run a deep audit via the scan command.
When running as an MCP server, AgentAudit exposes the following tools to your AI agent:
| Tool | Description |
|------|-------------|
| audit_package | Deep LLM-powered audit of a repository |
| check_registry | Look up a package in the trust registry |
| submit_report | Upload audit findings to the registry |
| discover_servers | Find MCP servers in local editor configs |
User asks agent to install a package
│
▼
Agent calls check_registry(package_name)
│
┌────┴────┐
│ │
Found Not Found
│ │
▼ ▼
Return Agent calls audit_package(repo_url)
score │
▼
LLM analyzes code (3-pass)
│
▼
Agent calls submit_report(findings)
│
▼
Return findings + risk score
Core Security
AI-Specific
MCP-Specific
Persistence & Obfuscation
The deep audit (agentaudit audit) uses a structured 3-phase LLM analysis — not a single-shot prompt, but a rigorous multi-pass process:
| Phase | Name | What Happens | |-------|------|-------------| | 1 | 🔍 UNDERSTAND | Read all files and build a Package Profile: purpose, category, expected behaviors, trust boundaries. No scanning yet — the goal is to understand what the package should do before looking for what it shouldn't. | | 2 | 🎯 DETECT | Evidence collection against 50+ detection patterns across 8 categories (AI-specific, MCP, persistence, obfuscation, cross-file correlation). Only facts are recorded — no severity judgments yet. | | 3 | ⚖️ CLASSIFY | Every finding goes through a Mandatory Self-Check (5 questions), Exploitability Assessment, and Confidence Gating. HIGH/CRITICAL findings must survive a Devil's Advocate challenge and include a full Reasoning Chain. |
Why 3 passes? Single-pass analysis is the #1 cause of false positives. By separating understanding → detection → classification:
This architecture achieved 0% false positives on our 11-package test set, down from 42% in v2.
AgentAudit is designed for CI pipelines with proper exit codes and JSON output:
# GitHub Actions example
- name: Scan MCP servers
run: |
npx agentaudit scan https://github.com/org/mcp-server --json --quiet > results.json
# Exit code 1 = findings detected → fail the build
# Shell scripting
agentaudit scan https://github.com/owner/repo --json --quiet 2>/dev/null
if [ $? -eq 1 ]; then
echo "Security findings detected!"
exit 1
fi
# Scan with JSON output
agentaudit scan https://github.com/owner/repo --json
{
"slug": "repo",
"url": "https://github.com/owner/repo",
"findings": [
{
"severity": "high",
"title": "Command injection risk",
"file": "src/handler.js",
"line": 42,
"snippet": "exec(`git ${userInput}`)"
}
],
"fileCount": 15,
"duration": "1.8s"
}
# Registry lookup with JSON
agentaudit lookup fastmcp --json
Coming soon:
--fail-on <severity>flag to set minimum severity threshold for non-zero exit (e.g.,--fail-on highignores low/medium findings).
AgentAudit stores credentials in ~/.config/agentaudit/credentials.json (or $XDG_CONFIG_HOME/agentaudit/credentials.json).
Run agentaudit setup to configure interactively, or set via environment:
export AGENTAUDIT_API_KEY=asf_your_key_here
| Variable | Description |
|----------|-------------|
| AGENTAUDIT_API_KEY | API key for registry access |
| ANTHROPIC_API_KEY | Anthropic API key for deep audits (Claude) |
| OPENAI_API_KEY | OpenAI API key for deep audits (GPT-4o) |
| NO_COLOR | Disable ANSI colors (no-color.org) |
npm install -g agentaudit
agentaudit setup
Or use without installing: npx agentaudit
scan): No API key needed — runs locally with regexaudit): Needs an LLM API key (see below)lookup): No key needed for reading; key needed for uploading reportsThe audit command supports Anthropic (Claude) and OpenAI (GPT-4o). Set one of these environment variables:
# Linux / macOS
export ANTHROPIC_API_KEY=sk-ant-... # Recommended
export OPENAI_API_KEY=sk-... # Alternative
# Windows (PowerShell)
$env:ANTHROPIC_API_KEY = "sk-ant-..."
$env:OPENAI_API_KEY = "sk-..."
# Windows (CMD)
set ANTHROPIC_API_KEY=sk-ant-...
set OPENAI_API_KEY=sk-...
Priority: If both are set, Anthropic is used. The active provider is shown during the audit.
Troubleshooting: If you see API error: Incorrect API key, double-check your key is valid and has credits. Use --debug to see the full API response.
agentaudit.dev to check for existing auditsQuick scans (agentaudit scan) work fully offline after cloning. Registry lookups and deep audits require network access.
Yes! npx agentaudit starts the MCP server when invoked by an editor. The CLI and MCP server are the same package — behavior is determined by how it's called.
discover know which editors I use?It checks standard config file locations for Claude Desktop, Cursor, VS Code, and Windsurf. It also checks the current working directory for project-level .cursor/mcp.json and .vscode/mcp.json.
| | Project | Description | |---|---------|-------------| | 🌐 | agentaudit.dev | Trust Registry -- browse packages, findings, leaderboard | | 🛡️ | agentaudit-skill | Agent Skill -- pre-install security gate for Claude Code, Cursor, Windsurf | | ⚡ | agentaudit-github-action | GitHub Action -- CI/CD security scanning | | 📚 | agentaudit-mcp | This repo -- CLI + MCP server source | | 🐛 | Report Issues | Bug reports and feature requests |
AGPL-3.0 — Free for open source use. Commercial license available for proprietary integrations.
Protect your AI stack. Scan before you trust.
</div>Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/snapshot"
curl -s "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/contract"
curl -s "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
80
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
74
Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Rank
72
An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_MCP",
"generatedAt": "2026-04-17T05:27:38.192Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "security",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "audit",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "mcp",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "mcp-server",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "ai-agent",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "scanner",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "vulnerability",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "prompt-injection",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "agent-security",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "cli",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:MCP|unknown|profile capability:security|supported|profile capability:audit|supported|profile capability:mcp|supported|profile capability:mcp-server|supported|profile capability:ai-agent|supported|profile capability:scanner|supported|profile capability:vulnerability|supported|profile capability:prompt-injection|supported|profile capability:agent-security|supported|profile capability:cli|supported|profile"
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Agentaudit",
"href": "https://agentaudit.dev",
"sourceUrl": "https://agentaudit.dev",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T03:23:18.916Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP",
"href": "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T03:23:18.916Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "2 GitHub stars",
"href": "https://github.com/starbuck100/agentaudit-mcp",
"sourceUrl": "https://github.com/starbuck100/agentaudit-mcp",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T03:23:18.916Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-starbuck100-agentaudit-mcp/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[]
Sponsored
Ads related to agentaudit and adjacent AI workflows.