{"id":"aira-security-mcp-armor","name":"mcp-armor","af_score":37.0,"security_score":34.5,"reliability_score":30.0,"what_it_does":"mcp-armor is a local Python CLI tool that auto-discovers and scans Model Context Protocol (MCP) configurations (for popular agent/IDE setups), inventories MCP tools/resources/prompts, runs static security checks (e.g., prompt injection, tool poisoning/shadowing, secret detection), and optionally performs baseline drift detection via an inspect/scan workflow that flags deviations from an approved baseline.","best_when":"You want local, static security scanning and drift detection for MCP configurations integrated into development tools/agents, and you can maintain an approved baseline.","avoid_when":"You need real-time runtime blocking or enforcement, or you require an always-on hosted security service with dashboards/webhooks.","last_evaluated":"2026-03-30T13:45:30.036235+00:00","has_mcp":false,"has_api":false,"auth_methods":[],"has_free_tier":false,"known_gotchas":["CLI-focused: no clearly documented programmatic/SDK interface for agents to integrate directly.","Behavior depends on local environment discovery of MCP configurations (paths/format expectations may vary by IDE/client).","Baseline drift detection requires an existing baseline produced by inspect; first run behavior differs from subsequent runs."],"error_quality":0.0}