• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

November 17, 2025

Views: 503

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic proxy between agents and Model Context Protocol (MCP) servers. In proxy mode it sits in the traffic path, logging and enforcing guardrails on tool calls in real time, so both red teams and defenders can see precisely how agents use MCP tools and where prompt injection or tool abuse appears.

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Overview

MCP provides a structured way for AI agents to talk to external tools and data sources, but those tools often sit behind opaque configuration files and hidden network flows. Misconfigured MCP servers can expose shell access, code execution, data exfiltration paths, or stealthy prompt-injection chains. mcp-scan addresses this by offering two modes:

  • Scan mode to inspect MCP configurations on disk and highlight risky tool definitions.
  • Proxy mode to intercept and monitor live MCP traffic between an agent and its servers.

Where earlier tools like mcp-scanner focus on batch scanning of endpoints and configs, mcp-scan adds continuous, real-time visibility into agent behaviour.

Features

  • Automatic MCP discovery: locates MCP client and server configs for common agent environments and scans them for risky settings.
  • Prompt-injection and tool-poisoning checks: inspect tool definitions and flows that may allow untrusted prompts or malicious tools to influence the agent.
  • Dynamic proxy mode: runs as a man-in-the-middle, relaying traffic while logging every tool invocation, argument, and response.
  • Guardrail policies: use YAML-defined rules to block or allow tool calls, detect secrets and PII, and filter tool output by content patterns.
  • Audit-ready logging: records traffic and guardrail events for later investigation, hunting, and replay.

Installation

mcp-scan is distributed as a simple CLI. The project documentation shows installation via package runners so that you can use it without a complete local build. Example commands:

1
2
3
4
5
# Run via uv
uvx mcp-scan@latest
 
# Or via npx
npx mcp-scan@latest

Check the repository README for the latest installation options and platform notes before running it in production.

Usage

mcp-scan supports both offline scanning and live proxying. Typical patterns include:

1
2
# To scan a particular MCP server configuration, for example, a VS Code MCP config, you can run:
mcp-scan ~/.vscode/mcp.json

These options are available for all commands:

1
2
3
4
5
6
--storage-file FILE    Path to store scan results and whitelist information (default: ~/.mcp-scan)
--base-url URL         Base URL for the verification server
--verbose              Enable detailed logging output
--print-errors         Show error details and tracebacks
--full-toxic-flows     Show all tools that could take part in toxic flow. By default only the top 3 are shown.
--json                 Output results in JSON format instead of rich text

Guardrails are defined in YAML and attached to specific client/server combinations. A simplified example:

1
2
3
4
5
6
7
8
9
10
11
12
13
<client-name>:  # your client's shorthand (e.g., cursor, claude, windsurf)
  <server-name>:  # your server's name according to the mcp config (e.g., whatsapp-mcp)
    guardrails:
      secrets: block # block calls/results with secrets
 
      custom_guardrails:
        - name: "Filter tool results with 'error'"
          id: "error_filter_guardrail"
          action: block # or just 'log'
          content: |
            raise "An error was found." if:
              (msg: ToolOutput)
              "error" in msg.content

In proxy mode, mcp-scan rewrites the MCP client configuration to point at the local proxy, forwards all traffic, applies guardrails, and restores the original configuration on exit.

Attack Scenario

Objective: use mcp-scan in proxy mode during a red-team engagement to watch and abuse MCP tool calls in real time.

  1. Identify a target agent that uses MCP servers (for example, an internal automation agent or developer assistant).
  2. Configure the MCP client to route through mcp-scan proxy. Ensure traffic now flows agent → mcp-scan → MCP server.
  3. Drive realistic user prompts through the agent and capture the live tool call stream. Map which MCP servers and tools get invoked, and with what parameters.
  4. Look for tools with over-privileged capabilities: file system access, shell execution, broad network access or ability to fetch arbitrary URLs.
  5. Craft prompt-injection payloads or malicious tool responses and observe how the agent behaves in proxy logs. Use this evidence to demonstrate chained attacks such as data exfiltration, lateral movement or cross-tenant access.

Red Team Relevance

For red teams, mcp-scan turns opaque agent behaviour into something you can reason about. You can:

  • Discover undocumented tools and hidden capabilities exposed via MCP.
  • Replay or modify tool calls to test how robust the agent’s prompt handling and tool routing really are.
  • Build attack chains that combine prompt injection with over-privileged tools and show exactly which flows defenders need to monitor or disable.

It also pairs naturally with broader GenAI assessments covered on Darknet, such as multi-agent orchestration in the HexStrike AI article and the techniques in the “Red Teaming LLMs 2025” piece, where understanding tool calls and delegated actions is critical.

Comparison: mcp-scanner vs mcp-scan

Capabilitymcp-scannermcp-scan
Static MCP config / endpoint scanningYes – focus on prompt-injection and insecure tool patternsYes – via scan mode
Runtime intercept / proxyNo – runs as a batch scannerYes – proxy mode sits inline with traffic
Guardrail policy enforcementLimited or externalYes – YAML rules applied to live tool calls and outputs
Real-time agent behaviour monitoringNo – relies on scan results and logsYes – continuous stream of tool invocations and responses
Audit logging of tool callsBasic findings outputRich event logs suitable for ingestion into SIEM or hunt pipelines

In short, mcp-scanner is ideal for broad, repeatable audits of MCP servers and codebases, while mcp-scan is better suited to live traffic analysis, behavioural guardrails, and incident response.

Detection and Mitigation

  • Deploy mcp-scan in monitoring mode first to baseline how agents actually use MCP tools before you switch to blocking policies.
  • Define strict guardrails around high-risk tools (shell access, file I/O, network fetchers, database connectors) and restrict where they can be called from.
  • Alert on configuration changes to MCP servers and tool definitions, especially when combined with unusual proxy logs.
  • Ingest proxy logs into your SIEM or data lake so detection engineers can author hunts for suspicious sequences of tool calls.
  • Use mcp-scanner plus mcp-scan together: mcp-scanner for broad coverage of all servers, mcp-scan for deep inspection of the most critical agent pathways.

Conclusion

mcp-scan closes an essential gap in GenAI security: real-time visibility into how agents actually use their tools. By combining static scanning with a dynamic proxy, it provides both red and blue teams with a practical way to explore, monitor, and enforce safe MCP usage. For any organisation experimenting with agentic workflows or multi-tool orchestration, mcp-scan should sit alongside mcp-scanner as a core part of the guardrail stack.

You can read more or download mcp-scan here: https://github.com/invariantlabs-ai/mcp-scan

Related Posts:

  • mcp-scanner - Python MCP Scanner for…
  • Red Teaming LLMs 2025 - Offensive Security Meets…
  • LLM Black Markets in 2025 - Prompt Injection,…
  • An Introduction To Web Application Security Systems
  • XRayC2 - Weaponizing AWS X-Ray for Covert Command…
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: GenAI Tagged With: hacking mcp, mcp security, mcp security scanner



Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 691

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 718

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 403

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 1,643

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 503

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 577

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,403,961)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,904)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,361)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,192)
  • Password List Download Best Word List – Most Common Passwords (934,431)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,145)
  • Hack Tools/Exploits (674,084)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,148)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy