medusa

MEDUSA is an open-source (Python) AI-first security scanner/CLI that detects vulnerabilities and insecure patterns in traditional code as well as AI/ML and agent/LLM application artifacts (including prompt-injection style rules, RAG pipeline risks, MCP server configurations, and repo poisoning via editor/agent configuration files). It also supports scanning local directories and (optionally) cloning/scanning GitHub repos via a --git flag, producing reports in multiple formats (JSON/HTML/Markdown/SARIF).

Evaluated Mar 30, 2026 (21d ago)
Homepage ↗ Repo ↗ Security security sast ai-security llm-security prompt-injection mcp agent-security supply-chain cve cli python
⚙ Agent Friendliness
45
/ 100
Can an agent use this?
🔒 Security
32
/ 100
Is it safe for agents?
⚡ Reliability
32
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
0
Documentation
65
Error Messages
0
Auth Simplicity
95
Rate Limits
0

🔒 Security

TLS Enforcement
10
Auth Strength
20
Scope Granularity
20
Dep. Hygiene
70
Secret Handling
55

Runs locally as a CLI; no server-side auth model is described. For network/remote scanning, TLS requirements and secret-safety behaviors are not documented in the provided content. Dependencies include common libraries (requests/urllib3/defusedxml/psutil/pyyaml); using defusedxml is a positive signal against XML-related attacks, but overall dependency CVE status and secret-handling/logging behavior are not verifiable from the provided text.

⚡ Reliability

Uptime/SLA
0
Version Stability
55
Breaking Changes
40
Error Recovery
35
AF Security Reliability

Best When

You need automated, repeatable static analysis of both code and AI/agent-related artifacts before deployment, especially in CI pipelines for ML/LLM projects and repos with MCP/tooling configurations.

Avoid When

You require guarantees equivalent to dynamic testing, or you cannot tolerate false positives/heuristics inherent to static pattern scanning without review and tuning.

Use Cases

  • Scanning repositories for AI supply-chain attacks (e.g., poisoned editor/agent configs) using CLI
  • Pre-commit/CI security checks for LLM/agent projects (prompt injection, tool poisoning, MCP config risks, RAG issues)
  • Detecting known CVEs mapped to AI/agent ecosystems (e.g., Log4Shell and related categories) via pattern rules
  • Generating CI-friendly machine-readable SARIF/JSON reports for security workflows
  • Baseline SAST for many languages using built-in analyzer integrations and optional external linters

Not For

  • Runtime vulnerability validation (it is primarily static/pattern-based scanning of code/configs)
  • Being used as the sole authority for incident response or exploitation attempts without corroborating evidence
  • Use as a hosted SaaS (based on provided data, it is distributed as a local CLI tool)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No authentication mechanism is described because MEDUSA is presented as a local CLI scanner. A --git option implies Git clone access to public repositories; no token/auth flow details are provided in the supplied README/manifest.

Pricing

Free tier: No
Requires CC: No

No hosted pricing is described; distribution appears as an installable Python package.

Agent Metadata

Pagination
none
Idempotent
True
Retry Guidance
Not documented

Known Gotchas

  • Static scanning can produce false positives; agents should review outputs and possibly tune configuration via .medusa.yml.
  • Remote repo scanning via --git may depend on network access/clone permissions; agents may need to handle transient network failures.
  • Optional external linters are environment-dependent; results may vary based on installed tooling.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for medusa.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered