How MCPShield's 80 detection rules map to the OWASP MCP Top 10 security framework.
Hardcoded keys, env var leakage, credential theft
Malicious tool descriptions, shadowing, cross-tool manipulation
Command injection, path traversal, SQL injection, SSRF
Hidden Unicode, bidi overrides, homoglyphs, injection markers
Malicious packages, typosquatting, git persistence, config injection
Over-privileged tools, destructive operations, sampling abuse
Missing auth, CORS misconfiguration, weak transport security
Missing logging, no immutable audit trail for tool calls
No rules yet — planned for future release.
Unauthorized MCP instances, privacy claim violations
Data exfiltration, DNS tunneling, base64 exfil
Benchmark results: 100% recall on GenTelBench-v1 (50K samples) and MCPTox (485 samples).
Scan Your MCP Server