Find security risks in your MCP servers before attackers do. Zero dependencies, zero config, zero account required.
npx decoy-scanScans Claude Desktop, Cursor, Windsurf, VS Code, Claude Code, Zed, and Cline. Finds risky tools, detects prompt injection, analyzes toxic data flows, tracks manifest changes, and maps everything to the OWASP Agentic Top 10.
| Check | What it finds |
|---|---|
| Tool risk classification | Critical/high/medium/low tools by name + description |
| Prompt injection detection | 37 patterns across 20 attack categories in tool descriptions |
| Toxic flow analysis | Cross-server data leak (TF001) and destructive (TF002) attack chains |
| Tool manifest hashing | Detects tool additions, removals, and description changes between scans |
| Skill scanning | Prompt injection, hardcoded secrets, suspicious URLs in Claude Code skills |
| Server command analysis | Pipe-to-shell, inline code, typosquatting, temp directory spawning |
| Environment variable exposure | API keys, tokens, secrets, cloud credentials passed to servers |
| Supply chain advisories | 40+ known vulnerable MCP packages via Decoy advisory database |
| Transport security | HTTP without TLS, missing auth, wildcard CORS, public-bound SSE |
| Input sanitization | Unconstrained parameters, missing maxLength, open schemas |
| Permission scope | Over-privileged servers, dangerous capability combinations |
| OWASP mapping | Every finding mapped to ASI01–ASI05 |
One step. Scans MCP configs, enforces policy, uploads results to GitHub Security tab.
# .github/workflows/mcp-security.yml
name: MCP Security
on: [push, pull_request]
jobs:
scan:
runs-on: ubuntu-latest
permissions:
security-events: write
steps:
- uses: actions/checkout@v4
- uses: decoy-run/decoy-scan@v1That's it. Fails the build if critical tools or prompt injection are found. Results appear in the Security tab.
- uses: decoy-run/decoy-scan@v1
with:
policy: no-critical,no-poisoning,no-toxic-flows
report: true
token: ${{ secrets.DECOY_TOKEN }}| Input | Default | Description |
|---|---|---|
policy |
no-critical,no-poisoning |
Comma-separated policy rules |
sarif |
true |
Upload SARIF to GitHub Security tab |
report |
false |
Upload to Decoy Guard dashboard |
token |
— | Decoy API token (for report) |
verbose |
false |
Show all tools including low-risk |
no-critical Fail on critical tools (code exec, file write)
no-high Fail on high-risk tools (file read, network)
no-poisoning Fail on prompt injection in tool descriptions
no-toxic-flows Fail on cross-server data leak / destructive chains
no-secrets Fail on secrets exposed in MCP config
require-tripwires Fail if decoy-tripwire not installed
max-critical=N Fail if more than N critical tools
max-high=N Fail if more than N high-risk tools
If you prefer raw commands over the Action:
- run: npx decoy-scan --policy=no-critical,no-poisoning
- run: npx decoy-scan --sarif > results.sarif
- uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: results.sarifnpx decoy-scan # Full scan with server probing
npx decoy-scan --json # JSON output (stdout, pipeable to jq)
npx decoy-scan --sarif # SARIF 2.1.0 for GitHub Security / VS Code
npx decoy-scan --skills # Also scan Claude Code skills
npx decoy-scan --no-probe # Config-only (don't spawn servers)
npx decoy-scan --no-advisories # Skip advisory database check
npx decoy-scan --report # Upload results to Decoy dashboard
npx decoy-scan --policy=RULES # CI/CD policy gate (exit 2 on violation)
npx decoy-scan --verbose # Show all tools including low-risk
npx decoy-scan --quiet # Suppress status output (exit code only)
npx decoy-scan --no-color # Disable colored outputRun from your project root to include project-level .mcp.json configs.
| Code | Meaning |
|---|---|
0 |
No critical or high-risk issues |
1 |
High-risk issues found |
2 |
Critical issues, tool poisoning, toxic flows, or policy violation |
import {
scan,
toSarif,
classifyTool,
detectPoisoning,
analyzeToxicFlows,
hashToolManifest,
detectManifestChanges,
discoverSkills,
analyzeSkill,
} from 'decoy-scan';
const results = await scan({ skills: true });
console.log(results.toxicFlows); // [{ id: "TF001", severity: "critical", roles: {...} }]
console.log(results.skills); // [{ name: "...", findings: [...] }]
console.log(results.servers[0].manifestHash); // "45c4c571f03c78a2"| decoy-scan | Snyk agent-scan | |
|---|---|---|
| Language | JavaScript | Python |
| Dependencies | 0 | 15 (aiohttp, pydantic, mcp, etc.) |
| Install | npx decoy-scan |
uvx snyk-agent-scan + Snyk account |
| Cloud required | No | Yes (sends data to Snyk API) |
| Toxic flow analysis | Yes (local) | Yes (cloud) |
| Manifest change detection | Yes | Yes (registry-based) |
| Skill scanning | Yes | Yes |
| CI/CD policy gate | Yes | No |
| SARIF output | Yes | No |
| OWASP mapping | Yes | No |
| Hosts supported | 8 | 6 |
| Tripwire integration | Yes (decoy-tripwire) | No |
Claude Desktop, Cursor, Windsurf, VS Code, Claude Code (global + project), Zed, Cline
- decoy-tripwire — Tripwire tools that detect when agents are compromised
- Decoy Guard — Dashboard, threat intel, compliance reports
- OWASP Agentic Top 10
MIT