MCPShield discovers unauthorized MCP servers across your organization. See what Claude, ChatGPT, and other AI tools can access before attackers do.
MCP servers give AI assistants direct access to databases, file systems, and APIs. Security teams have zero visibility.
Developers configure MCP servers with database credentials, API keys, and file system access. You can't secure what you can't see.
MCP configs often contain plaintext passwords, API tokens, and connection strings. One leaked config = full database access.
AI tools with uncontrolled data access violate SOC2, HIPAA, and GDPR. Auditors are starting to ask about AI governance.
MCPShield scans every machine, discovers every MCP server, and assesses every risk—automatically.
Deploy a lightweight agent that scans for MCP configurations across Claude Desktop, Cursor, VS Code, and custom setups. No manual inventory needed.
Our engine analyzes each MCP server's configuration to calculate a risk score from 0-100. Prioritize what matters most.
Run scans whenever you need them. Get a complete inventory of every MCP server on a machine in seconds.
Critical findings are surfaced immediately in your dashboard so your team can act fast on high-risk configurations.
Get your first security insights in under 5 minutes.
Install our lightweight Python agent on endpoints. One pip command, works everywhere.
pip install mcpshield-agent
Configure your agent with an API key, then run a scan to discover MCP configs.
mcpshield configure --api-key YOUR_KEYmcpshield scan
See all servers in your dashboard with risk scores. Take action on high-risk configurations.
mcpshield scan --report
Watch MCPShield discover MCP servers in real-time.
Simulates a scan discovering MCP servers
Give your team instant visibility into MCP server risk. Embed dynamic risk score badges in your internal wikis, READMEs, or Confluence pages. Badges update in real-time as your security posture changes.
Get MCPShield running with a single command. Native packages for every platform, plus built-in hooks for the enterprise tools your security team already uses.
pip install mcpshield-agent
Available now on PyPI. Works on Windows, macOS, and Linux.
brew tap mcpshield/tap
brew install mcpshield
curl -fsSL https://pkg.mcpshield.app/gpg | sudo gpg --dearmor -o /usr/share/keyrings/mcpshield.gpg
echo "deb [signed-by=/usr/share/keyrings/mcpshield.gpg] https://pkg.mcpshield.app/deb stable main" | sudo tee /etc/apt/sources.list.d/mcpshield.list
sudo apt update && sudo apt install mcpshield
sudo rpm --import https://pkg.mcpshield.app/gpg
sudo dnf config-manager --add-repo https://pkg.mcpshield.app/rpm/mcpshield.repo
sudo dnf install mcpshield
Forward risk alerts and server discovery events to Splunk via HEC (HTTP Event Collector). Real-time indexing of MCP security data.
Ship alerts to Elasticsearch via Logstash or Filebeat. Pre-built Kibana dashboards for MCP risk visualization.
Native Azure Sentinel connector. Correlate MCP risk events with your existing SIEM workflows.
Send alerts to any endpoint. Compatible with PagerDuty, OpsGenie, Slack, Teams, and custom automation.
Start discovering shadow AI agents in your infrastructure today. Free and open source.