trailofbits / mcp-context-protectorLinks
MCP security wrapper
☆207Updated 2 months ago
Alternatives and similar repositories for mcp-context-protector
Users that are interested in mcp-context-protector are comparing it to the libraries listed below
Sorting:
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆137Updated 8 months ago
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆151Updated last week
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Updated 3 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆121Updated last month
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆36Updated this week
- ☆76Updated 3 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆80Updated 6 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Updated 10 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆159Updated last year
- PII detection platform, leveraging human-in-the-loop AI☆53Updated last year
- Scan MCP servers for potential threats & security findings.☆778Updated this week
- Baseline rules files to improve the security of AI-generated code (Claude, Cursor, Copilot + more)☆216Updated last month
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆127Updated last month
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆102Updated 3 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated last week
- A Software as a Service (SaaS) log collection framework.☆182Updated 3 weeks ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated 5 months ago
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆189Updated this week
- Sandboxed devcontainer for running Claude Code in bypass mode safely. Built for security audits and untrusted code review.☆270Updated last week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Data about all known supply-chain attacks through history☆63Updated 8 months ago
- ☆433Updated last week
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆215Updated last week
- ☆363Updated 4 months ago
- 💅🏽 analyzes your github actions☆97Updated last month
- Semgrep-based Policy Controller for Kubernetes☆47Updated 10 months ago
- ☆29Updated last month
- A simple touchID prompt'er for use in shell scripts.☆99Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated 2 years ago
- Security tool against dependency typosquatting attacks☆54Updated this week