ramparts
Ramparts is a fast, lightweight security scanner designed for Model Context Protocol (MCP) servers. It features built-in vulnerability detection, enhancing the security of the MCP ecosystem. Developed in Rust, it supports the latest versions and ensures efficient scanning.
GitHub Stars
56
User Rating
Not Rated
Favorites
0
Views
21
Forks
9
Issues
5
Ramparts: mcp (model context protocol) scanner

A fast, lightweight security scanner for Model Context Protocol (MCP) servers with built-in vulnerability detection.
Overview
Ramparts is a scanner designed for the Model Context Protocol (MCP) ecosystem. As AI agents and LLMs increasingly rely on external tools and resources through MCP servers, ensuring the security of these connections has become critical.
The Model Context Protocol (MCP) is an open standard that enables AI assistants to securely connect to external data sources and tools. It allows AI agents to access databases, file systems, and APIs through toolcalling to retrieve real-time information and interact with external or internal services.
Ramparts is under active development. Read our launch blog.
The Security Challenge
MCP servers expose powerful capabilitiesβfile systems, databases, APIs, and system commandsβthat can become attack vectors like tool poisoning, command injection, and data exfiltration without proper security analysis. - π Security Features & Attack Vectors
What Ramparts Does
Ramparts provides security scanning of MCP servers by:
- Discovering Capabilities: Scans all MCP endpoints to identify available tools, resources, and prompts
- Multi-Transport Support: Supports HTTP, SSE, stdio, and subprocess transports with intelligent fallback
- Session Management: Handles stateful MCP servers with automatic session ID management
- Static Analysis: Performs yara-based checks for common vulnerabilities
- Cross-Origin Analysis: Detects when tools span multiple domains, which could enable context hijacking or injection attacks
- LLM-Powered Analysis: Uses AI models to detect sophisticated security issues
- Risk Assessment: Categorizes findings by severity and provides actionable recommendations
π‘ Jump directly to detailed Rampart features?
π Detailed Features
Who Ramparts is For
- Developers: Scan MCP servers for vulnerabilities in your development environment (Cursor, Windsurf, Claude Code) or production deployments.
- MCP users: Scan third-party servers before connecting, validate local servers before production.
- MCP developers: Ensure your tools, resources, and prompts don't expose vulnerabilities to AI agents.
Use Cases
- Security Audits: Comprehensive assessment of MCP server security posture
- Development: Testing MCP servers during development and testing phases
- CI/CD Integration: Automated security scanning in deployment pipelines
- Compliance: Meeting security requirements for AI agent deployments
π‘ Caution: Ramparts analyzes MCP server metadata and static configurations. For comprehensive security, combine with runtime MCP guardrails and adopt a layered security approach. The MCP threat landscape is rapidly evolving, and rampart is not perfect and inaccuracies are inevitable.
Quick Start
Installation
cargo install ramparts
Scan an MCP server
ramparts scan https://api.githubcopilot.com/mcp/ --auth-headers "Authorization: Bearer $TOKEN"
# Generate detailed markdown report (scan_YYYYMMDD_HHMMSS.md)
ramparts scan https://api.githubcopilot.com/mcp/ --auth-headers "Authorization: Bearer $TOKEN" --report
# Scan stdio/subprocess MCP servers
ramparts scan "stdio:npx:mcp-server-commands"
ramparts scan "stdio:python3:/path/to/mcp_server.py"
Scan your IDE's MCP configurations
# Automatically discovers and scans MCP servers from Cursor, Windsurf, VS Code, Claude Desktop, Claude Code
ramparts scan-config
# With detailed report generation
ramparts scan-config --report
π‘ Did you know you can start Ramparts as a server? Run
ramparts server
to get a REST API for continuous monitoring and CI/CD integration. See π Ramparts Server Mode
Run as an MCP server (stdio)
ramparts mcp-stdio
When publishing to Docker MCP Toolkit, configure the container command to ramparts mcp-stdio
so the toolkit connects via stdio. Use MCP-Dockerfile
to make this the default.
Example Output
Single server scan:
ramparts scan https://api.githubcopilot.com/mcp/ --auth-headers "Authorization: Bearer $TOKEN"
RAMPARTS
MCP Security Scanner
Version: 0.7.0
Current Time: 2025-08-04 07:32:19 UTC
Git Commit: 9d0c37c
π GitHub Copilot MCP Server
β
All tools passed security checks
βββ push_files β
passed
βββ create_or_update_file β οΈ 2 warnings
β βββ π HIGH (LLM): Tool allowing directory traversal attacks
β βββ π HIGH (YARA): EnvironmentVariableLeakage
βββ get_secret_scanning_alert β οΈ 1 warning
β βββ π HIGH (YARA): EnvironmentVariableLeakage
Summary:
β’ Tools scanned: 83
β’ Security issues: 3 findings
IDE configuration scan:
ramparts scan-config --report
π Found 3 IDE config files:
β vscode IDE: /Users/user/.vscode/mcp.json
β claude IDE: /Users/user/Library/Application Support/Claude/claude_desktop_config.json
β cursor IDE: /Users/user/.cursor/mcp.json
π vscode IDE config: /Users/user/.vscode/mcp.json (2 servers)
ββ github-copilot [HTTP]: https://api.githubcopilot.com/mcp/
ββ local-tools [STDIO]: stdio:python[local-mcp-server]
π MCP Servers Security Scan Summary
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
π Scan Summary:
β’ Servers: 2 total (2 β
successful, 0 β failed)
β’ Resources: 81 tools, 0 resources, 2 prompts
β’ Security: β
All servers passed security checks
π Detailed report generated: scan_20250804_073225.md
Contributing
We welcome contributions to Ramparts mcp scan. If you have suggestions, bug reports, or feature requests, please open an issue on our GitHub repository.
Documentation
- π Troubleshooting Guide - Solutions to common issues
- βοΈ Configuration Reference - Complete configuration file documentation
- π CLI Reference - All commands, options, and usage examples
Additional Resources
8
Followers
15
Repositories
0
Gists
0
Total Contributions
This AI Content Moderation System leverages OpenAI's moderation API to check user inputs in real-time, filtering out harmful content. This reduces the risk of AI chatbots generating dangerous information and ensures a safe experience for users. Developers can avoid legal risks and reputational damage, allowing them to operate their AI solutions with confidence.
The Thales CDSP CRDP MCP Server is an MCP server that enables AI applications and LLMs to securely protect and reveal sensitive data through the CipherTrust CRDP service. It supports both individual and bulk protect and reveal operations, along with versioning capabilities.