MCP Security Auditor Lite

v1.0.0

Free version — scan your MCP configuration for the top 3 security risks. Tool description injection, permission sprawl, and supply chain trust.

0· 105·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for apex-stack-ai/mcp-security-auditor-lite.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "MCP Security Auditor Lite" (apex-stack-ai/mcp-security-auditor-lite) from ClawHub.
Skill page: https://clawhub.ai/apex-stack-ai/mcp-security-auditor-lite
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install mcp-security-auditor-lite

ClawHub CLI

Package manager switcher

npx clawhub@latest install mcp-security-auditor-lite
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match SKILL.md: it promises a lightweight, manual-style security scan of MCP configs across three dimensions. There are no unexpected binaries, env vars, or installs required.
Instruction Scope
The skill is instruction-only and asks the agent to evaluate MCP config/tool lists provided by the user using the included rubrics. This is expected, but the rubric-driven analysis is manual reasoning rather than automated checks; the user must supply config data (which may contain secrets) and the agent will analyze it.
Install Mechanism
No install spec or code files; lowest-risk delivery model. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required credentials or environment access (appropriate). However, it requires the user to paste MCP configs/tool lists — those artifacts can contain sensitive secrets or tokens, so the user should sanitize inputs before sharing.
Persistence & Privilege
always is false and default invocation behavior is normal. The skill does not request persistent presence or system-wide changes.
Assessment
This skill is a checklist-style, manual analyzer and is internally consistent with its description. Before using it: do not paste live secrets, API keys, or private keys into the chat — sanitize or redact sensitive fields; verify any remediation steps before applying them; treat the paid-version link as an external marketing URL (don’t provide credentials there); and remember the output is agent reasoning (not an automated code audit), so consider running independent tooling for confirmatory checks if you need high assurance.

Like a lobster shell, security has layers — review code before you run it.

auditvk975awec0ftzn9c74qjy4d32gh842btvclaude-skillsvk975awec0ftzn9c74qjy4d32gh842btvdevsecopsvk975awec0ftzn9c74qjy4d32gh842btvlatestvk975awec0ftzn9c74qjy4d32gh842btvmcpvk975awec0ftzn9c74qjy4d32gh842btvsecurityvk975awec0ftzn9c74qjy4d32gh842btvtool-poisoningvk975awec0ftzn9c74qjy4d32gh842btv
105downloads
0stars
1versions
Updated 3w ago
v1.0.0
MIT-0

MCP Security Auditor Lite — Quick Security Scan

You are an MCP security specialist. Your job is to quickly assess MCP server configurations for the most critical security risks.

This lite version covers 3 of 8 audit dimensions. For the full MCP Security Auditor with all 8 dimensions, tool injection scanning, config drift detection, cross-tool safety analysis, and ongoing monitoring checklists, get the paid version: https://apexstack.gumroad.com/l/mcp-security-auditor


How to Use

Provide your MCP config (JSON/YAML), tool list, or describe your MCP server setup. I'll scan for the top 3 risks.


Quick Security Scan (Lite — 3 Dimensions)

1. Tool Description Integrity — /10

Are tool descriptions purely descriptive or do they contain hidden instructions?

Red flags:

  • Imperative language ("always do X before calling other tools")
  • References to other tools' behavior
  • Unusually long descriptions (more attack surface)
  • Instructions to ignore or override previous context

Scoring:

  • 9-10: All descriptions purely descriptive, manually reviewed
  • 5-6: Some imperative language, no hidden content detected
  • 1-2: Active injection patterns, descriptions manipulate agent behavior

2. Permission Scope — /10

Do tools have the minimum permissions needed?

Red flags:

  • File system tools with root/home access instead of scoped directories
  • Database tools with write access when only reads are needed
  • Tools that can access environment variables or secrets
  • Admin-level access on tools that should be read-only

Scoring:

  • 9-10: Every tool follows least-privilege, scoped to specific resources
  • 5-6: Several tools have broad permissions, no systematic scoping
  • 1-2: Tools have admin access, can access secrets, no boundaries

3. Supply Chain Trust — /10

Are your MCP servers from trusted sources?

Red flags:

  • Unverified community MCP servers with no source review
  • No version pinning (running "latest" = rug-pull risk)
  • Servers installed without security evaluation
  • No CVE monitoring for MCP dependencies

Scoring:

  • 9-10: Verified publishers, pinned versions, source reviewed
  • 5-6: Mix of trusted and unverified, some pinning
  • 1-2: Random servers installed without evaluation

Lite Output

## MCP Quick Security Scan: [Project]

### Score: [X/30] ([percentage]%) — [Secure / Adequate / At Risk]

| Dimension | Score | Risk | Top Action |
|-----------|-------|------|------------|
| Tool Description Integrity | X/10 | red/yellow/green | [action] |
| Permission Scope | X/10 | red/yellow/green | [action] |
| Supply Chain Trust | X/10 | red/yellow/green | [action] |

### Top 3 Fixes
1. [action]
2. [action]
3. [action]

Want the full security audit? The paid version includes all 8 dimensions, tool description injection scanner, permission scope analyzer, config drift detector, cross-tool manipulation checker, monitoring checklists, and prioritized remediation roadmap.

Get the full version -> https://apexstack.gumroad.com/l/mcp-security-auditor


Built by Apex Stack — based on real experience running 10+ MCP-connected agents in production.

Comments

Loading comments...