mcp-armor
mcp-armor is a local Python CLI tool that auto-discovers and scans Model Context Protocol (MCP) configurations (for popular agent/IDE setups), inventories MCP tools/resources/prompts, runs static security checks (e.g., prompt injection, tool poisoning/shadowing, secret detection), and optionally performs baseline drift detection via an inspect/scan workflow that flags deviations from an approved baseline.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
Strengths: focuses on MCP security analysis (prompt injection, tool poisoning/shadowing, hardcoded secret detection) and baseline drift detection; runs locally per README FAQ, reducing external data sharing. Unknowns/risks: the provided content does not specify how it securely handles collected artifacts (e.g., whether logs/reports might contain sensitive data), nor does it describe transport/auth controls when connecting to MCP servers. Dependencies include heavy ML packages (torch/transformers), which can increase attack surface and supply-chain risk if not pinned/maintained.
⚡ Reliability
Best When
You want local, static security scanning and drift detection for MCP configurations integrated into development tools/agents, and you can maintain an approved baseline.
Avoid When
You need real-time runtime blocking or enforcement, or you require an always-on hosted security service with dashboards/webhooks.
Use Cases
- • Pre-deployment security review of MCP server integrations configured in agent/IDE tooling
- • Automated detection of risky tool/prompt/resource content in MCP configurations
- • Baseline drift monitoring for MCP components over time (detect rug pulls / modified tools/resources/prompts)
- • Generating JSON/Markdown reports for security audits
Not For
- • Runtime enforcement/blocking of malicious tool usage (not provided in the open-source version)
- • Comprehensive agent behavior policy enforcement beyond MCP (mentioned as enterprise/platform capability only)
- • Services that require remote hosted scanning with centralized dashboards (open-source runs locally)
Interface
Authentication
No remote API is described; the CLI appears to run locally and connect to configured MCP servers for inspection.
Pricing
Open-source version is installed via pip. The README references an enterprise platform for additional runtime and policy enforcement capabilities, but does not list pricing for that platform in the provided content.
Agent Metadata
Known Gotchas
- ⚠ CLI-focused: no clearly documented programmatic/SDK interface for agents to integrate directly.
- ⚠ Behavior depends on local environment discovery of MCP configurations (paths/format expectations may vary by IDE/client).
- ⚠ Baseline drift detection requires an existing baseline produced by inspect; first run behavior differs from subsequent runs.
Alternatives
Full Evaluation Report
Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for mcp-armor.
AI-powered analysis · PDF + markdown · Delivered within 30 minutes
Package Brief
Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.
Delivered within 10 minutes
Score Monitoring
Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.
Continuous monitoring
Scores are editorial opinions as of 2026-03-30.