🔒 Browser-only · Public GitHub API · No data stored

MCP Server Inspector

Paste a GitHub URL of any Model Context Protocol server. We'll fetch the repo via the public GitHub API and run 20+ security and health checks — SSRF patterns, command injection, missing auth, abandonment, license, and more.

Optional: paste a GitHub PAT (raises rate limit to 5,000/hr · stays in browser)
modelcontextprotocol/servers awesome-mcp-servers stripe/agent-toolkit cloudflare/mcp-server-cloudflare
🛡️
Paste a GitHub URL above and hit Audit repo.
Public repos only. Anonymous requests are limited to 60/hour by GitHub — use the optional token to lift the limit.

Need a config file once you've picked an MCP?

The MCP Config Generator (shipping next) builds a copy-paste JSON for Claude Desktop, Cursor, Continue, and other clients. Until then — pair this audit with our prompt-injection tester to harden the agent that calls the MCP.

Open Prompt Injection Tester →

What is MCP and why audit it?

The Model Context Protocol (MCP) is the open standard, introduced by Anthropic, for connecting Large Language Models to external tools and data sources. By 2026, MCP marketplaces list thousands of community-built servers — calendar, GitHub, Slack, Postgres, Stripe, browser automation, file systems, internal company APIs, you name it. Installing an MCP server gives an LLM the ability to take real actions on your behalf, which means a malicious or sloppy server is functionally equivalent to running an unaudited binary with your credentials.

The MCP threat model in one paragraph

An MCP server is just a process you run that exposes tools to a client like Claude Desktop, Cursor, or Continue. Most servers are written in TypeScript or Python, fetch things over HTTP, and read/write files or hit your APIs with credentials you provide. The four most common security issues we find when auditing them are: (1) SSRF — the server fetches user-controlled URLs without restricting localhost/internal addresses; (2) command injection — user input is passed to exec or spawn without escaping; (3) missing auth — anyone who can reach the server can use it; (4) abandonment — the server hasn't been touched in months, dependencies are vulnerable, and nobody is going to fix it. This inspector flags all four plus a dozen more.

How the MCP Server Inspector works

The tool calls the public GitHub API directly from your browser. It fetches: repo metadata (stars, last push, archived status, license, default branch, open issues), the file tree, and the contents of likely-suspect files (package.json, pyproject.toml, README.md, the main entrypoint, mcp.json, smithery.yaml). It then runs a battery of regex-based checks against those files plus reasoning over the metadata. Every signal is shown in the breakdown so you can verify the finding yourself.

The 20+ checks, by category

Security: code patterns

Security: configuration

Health and trust

What this inspector cannot do

Why a browser-only tool?

Sending other people's repository contents to a SaaS scanner feels backwards when the scanner needs no special privileges. The browser already has a network stack and a regex engine — that's all you need. Your audits stay private, the GitHub API quota is yours (and you can lift it from 60/hour to 5,000/hour with a personal access token that never leaves the page), and the source of every check is auditable in this file.

FAQ

Will this audit any GitHub repo or only MCP servers? It works on any repo, but the heuristics are tuned for the MCP threat model. A general-purpose web app might get false positives on signals that are normal for a web framework but suspicious in a tool an LLM controls.

Where does my token go? Only to api.github.com, sent over HTTPS as the Authorization header. It never reaches our servers — there are no servers. View the network tab to verify.

Why does anonymous mode hit the rate limit so fast? GitHub allows 60 unauthenticated requests per hour per IP. Each audit makes 8–12 calls. Add a token (read:public_repo scope is enough) and you get 5,000/hour.

Can I trust an MCP that scores well here? A good score means no obvious red flags — not that the server is safe. A determined attacker can hide intent in subtle ways. Treat this as a first filter.

How is this different from Glama or other MCP marketplaces? Marketplaces curate. Inspectors audit. Use both: pick a server from a curated marketplace, then run it through the inspector before installing.