Server data from the Official MCP Registry
Thin MCP and CLI proxy for AI agent and MCP security auditing via a hosted backend
Thin MCP and CLI proxy for AI agent and MCP security auditing via a hosted backend
Set these up before or after installing:
Environment variable: AGENT_SECURITY_API_KEY
Environment variable: AGENT_SECURITY_BASE_URL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-joepangallo-mcp-audit-server": {
"env": {
"AGENT_SECURITY_API_KEY": "your-agent-security-api-key-here",
"AGENT_SECURITY_BASE_URL": "your-agent-security-base-url-here"
},
"args": [
"-y",
"ledd-mcp-audit-server"
],
"command": "npx"
}
}
}This MCP audit server proxy code is well-structured with proper error handling and reasonable security practices. Minor findings around code quality and input validation don't significantly impact security, as the server primarily forwards requests to a private audit API rather than performing risky operations directly. Supply chain analysis found 3 known vulnerabilities in dependencies (0 critical, 3 high severity). Package verification found 1 issue.
Scanned 7 files · 8 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!