Security for MCP servers
Scan before install. Protect at runtime. 103 real servers scanned - 84% had vulnerabilities.
Two layers of protection
Two layers of protection
The scanner catches vulnerabilities before install. The gateway catches them at runtime - blocking attacks as they happen.
- Scan before install60+ detection rules analyze source code, tool descriptions, and credentials. 12/12 known MCP CVEs detected. Run it on any server before installing.
- Protect at runtimeThe gateway proxies every JSON-RPC message between your AI agent and MCP servers. Shell injection, SSRF, and credential theft are blocked before they execute.
- Full audit trailEvery tool call, every argument, every response is logged. Know exactly what your MCP servers are doing - forwarded, blocked, or alerted.
What Oxvault catches
What Oxvault catches
Real vulnerabilities found in real MCP servers. Not theoretical - validated against 103 servers from the ecosystem.
- Command InjectionBlocks shell metacharacters, execSync with user input, os.system() calls. Found in Cloudflare, AWS, Microsoft, Desktop Commander.
- Credential TheftDetects hardcoded AWS keys, API tokens, private keys, Bearer tokens. Blocks policy violations targeting .ssh, .aws, .env files.
- Tool Description PoisoningCatches hidden instruction tags, unicode steganography, BiDi overrides, secrecy instructions, and cross-tool exfiltration patterns.
- SSRF & Path TraversalBlocks metadata IP access (169.254.169.254), RFC 1918 ranges, and ../ path sequences. Caught broken SSRF checks in Context7 and Klavis.
- Rug Pull DetectionTool descriptions are SHA-256 hashed at startup. Any mid-session change is flagged immediately. No other scanner does this.
- Response LeakageScans server responses for AWS keys, GitHub PATs, private keys, JWTs, database connection strings. Alerts without blocking.
Get protected in 3 steps
Get protected in 3 steps
From zero to fully protected in under 2 minutes. No configuration needed.
1
1. ScanCheck any MCP server before installing. Scans source code, tool descriptions, and credentials. Works with GitHub repos, npm packages, and local projects.2
2. ProtectOne command wraps all your MCP clients - Claude Code, Cursor, VS Code, Windsurf. Every tool call is inspected against security policies and scanner rules.3
3. MonitorWatch the audit log in real time. Every forwarded, blocked, and alerted message is recorded. Know exactly what your MCP servers are doing.Choose your security level
Choose your security level
The scanner is free and open source. The gateway adds runtime protection for developers who don't trust MCP servers.
Scanner
Open source. Free forever.
$0
forever
- 60+ detection rules
- 12/12 known MCP CVE detection
- Source code SAST analysis
- Credential and secret detection
- Tool description poisoning detection
- Hash pinning for rug pull detection
- SARIF + JSON output
- GitHub Action for CI/CD
Pro
Runtime protection for developers.
$29
/monthBilled annually. $39/month if paid monthly.
- Everything in Scanner
- Gateway runtime proxy (stdio + HTTP/SSE)
- Policy engine with custom rules
- Rug-pull detection at runtime
- Audit logging with viewer
- SSRF-hardened HTTP proxy
- Priority rule updates (48-hour CVE coverage)
- Email support
Validated against 103 real servers
Validated against 103 real servers
We scanned 103 real MCP servers from the ecosystem. 84% had security vulnerabilities. Here are some of the findings.
Hardcoded Bearer token found in source code. Authorization header with live API key committed to the repository.
Cloudflare MCP
CRITICAL - mcp-hardcoded-bearer-token
exec() in sandbox runner with user-controlled input. os.system() and os.popen() calls. Unsafe pickle.load() deserialization.
AWS MCP (awslabs/mcp)
CRITICAL - 7 findings
startsWith() used to check for private IPs - ineffective on full URLs. SSRF bypass allows access to internal services.
Context7 (upstash/context7)
CRITICAL - mcp-ssrf-broken-check
execSync with template literal interpolation - npm install ${packageName}. Direct command injection vector.
Microsoft MCP
CRITICAL - mcp-cmd-injection
6 command injection patterns via execSync with string concatenation across build scripts and system info collection.
Desktop Commander
CRITICAL - 6 findings
17 findings including command injection in Oracle thick mode setup and hardcoded AWS access keys in test shipping labels.
Activepieces
CRITICAL - 17 findings
Don't trust MCP servers. Verify them.
Don't trust MCP servers. Verify them.
84% of MCP servers have security vulnerabilities. Oxvault catches them before and during runtime. Free scanner, Pro gateway.
