ramparts
Rampartsは、モデルコンテキストプロトコル(MCP)サーバー向けの高速で軽量なセキュリティスキャナーです。組み込みの脆弱性検出機能を備えており、MCPエコシステムのセキュリティを強化します。Rustで開発されており、最新のバージョンに対応しています。
GitHubスター
56
ユーザー評価
未評価
お気に入り
0
閲覧数
34
フォーク
9
イシュー
5
Ramparts: mcp (model context protocol) scanner

A fast, lightweight security scanner for Model Context Protocol (MCP) servers with built-in vulnerability detection.
Overview
Ramparts is a scanner designed for the Model Context Protocol (MCP) ecosystem. As AI agents and LLMs increasingly rely on external tools and resources through MCP servers, ensuring the security of these connections has become critical.
The Model Context Protocol (MCP) is an open standard that enables AI assistants to securely connect to external data sources and tools. It allows AI agents to access databases, file systems, and APIs through toolcalling to retrieve real-time information and interact with external or internal services.
Ramparts is under active development. Read our launch blog.
The Security Challenge
MCP servers expose powerful capabilities—file systems, databases, APIs, and system commands—that can become attack vectors like tool poisoning, command injection, and data exfiltration without proper security analysis. - 📚 Security Features & Attack Vectors
What Ramparts Does
Ramparts provides security scanning of MCP servers by:
- Discovering Capabilities: Scans all MCP endpoints to identify available tools, resources, and prompts
- Multi-Transport Support: Supports HTTP, SSE, stdio, and subprocess transports with intelligent fallback
- Session Management: Handles stateful MCP servers with automatic session ID management
- Static Analysis: Performs yara-based checks for common vulnerabilities
- Cross-Origin Analysis: Detects when tools span multiple domains, which could enable context hijacking or injection attacks
- LLM-Powered Analysis: Uses AI models to detect sophisticated security issues
- Risk Assessment: Categorizes findings by severity and provides actionable recommendations
💡 Jump directly to detailed Rampart features?
📚 Detailed Features
Who Ramparts is For
- Developers: Scan MCP servers for vulnerabilities in your development environment (Cursor, Windsurf, Claude Code) or production deployments.
- MCP users: Scan third-party servers before connecting, validate local servers before production.
- MCP developers: Ensure your tools, resources, and prompts don't expose vulnerabilities to AI agents.
Use Cases
- Security Audits: Comprehensive assessment of MCP server security posture
- Development: Testing MCP servers during development and testing phases
- CI/CD Integration: Automated security scanning in deployment pipelines
- Compliance: Meeting security requirements for AI agent deployments
💡 Caution: Ramparts analyzes MCP server metadata and static configurations. For comprehensive security, combine with runtime MCP guardrails and adopt a layered security approach. The MCP threat landscape is rapidly evolving, and rampart is not perfect and inaccuracies are inevitable.
Quick Start
Installation
cargo install ramparts
Scan an MCP server
ramparts scan https://api.githubcopilot.com/mcp/ --auth-headers "Authorization: Bearer $TOKEN"
# Generate detailed markdown report (scan_YYYYMMDD_HHMMSS.md)
ramparts scan https://api.githubcopilot.com/mcp/ --auth-headers "Authorization: Bearer $TOKEN" --report
# Scan stdio/subprocess MCP servers
ramparts scan "stdio:npx:mcp-server-commands"
ramparts scan "stdio:python3:/path/to/mcp_server.py"
Scan your IDE's MCP configurations
# Automatically discovers and scans MCP servers from Cursor, Windsurf, VS Code, Claude Desktop, Claude Code
ramparts scan-config
# With detailed report generation
ramparts scan-config --report
💡 Did you know you can start Ramparts as a server? Run
ramparts server
to get a REST API for continuous monitoring and CI/CD integration. See 📚 Ramparts Server Mode
Run as an MCP server (stdio)
ramparts mcp-stdio
When publishing to Docker MCP Toolkit, configure the container command to ramparts mcp-stdio
so the toolkit connects via stdio. Use MCP-Dockerfile
to make this the default.
Example Output
Single server scan:
ramparts scan https://api.githubcopilot.com/mcp/ --auth-headers "Authorization: Bearer $TOKEN"
RAMPARTS
MCP Security Scanner
Version: 0.7.0
Current Time: 2025-08-04 07:32:19 UTC
Git Commit: 9d0c37c
🌐 GitHub Copilot MCP Server
✅ All tools passed security checks
└── push_files ✅ passed
└── create_or_update_file ⚠️ 2 warnings
│ └── 🟠 HIGH (LLM): Tool allowing directory traversal attacks
│ └── 🟠 HIGH (YARA): EnvironmentVariableLeakage
└── get_secret_scanning_alert ⚠️ 1 warning
│ └── 🟠 HIGH (YARA): EnvironmentVariableLeakage
Summary:
• Tools scanned: 83
• Security issues: 3 findings
IDE configuration scan:
ramparts scan-config --report
🔍 Found 3 IDE config files:
✓ vscode IDE: /Users/user/.vscode/mcp.json
✓ claude IDE: /Users/user/Library/Application Support/Claude/claude_desktop_config.json
✓ cursor IDE: /Users/user/.cursor/mcp.json
📁 vscode IDE config: /Users/user/.vscode/mcp.json (2 servers)
└─ github-copilot [HTTP]: https://api.githubcopilot.com/mcp/
└─ local-tools [STDIO]: stdio:python[local-mcp-server]
🌍 MCP Servers Security Scan Summary
────────────────────────────────────────────────────────────
📊 Scan Summary:
• Servers: 2 total (2 ✅ successful, 0 ❌ failed)
• Resources: 81 tools, 0 resources, 2 prompts
• Security: ✅ All servers passed security checks
📄 Detailed report generated: scan_20250804_073225.md
Contributing
We welcome contributions to Ramparts mcp scan. If you have suggestions, bug reports, or feature requests, please open an issue on our GitHub repository.
Documentation
- 🔍 Troubleshooting Guide - Solutions to common issues
- ⚙️ Configuration Reference - Complete configuration file documentation
- 📖 CLI Reference - All commands, options, and usage examples