Mcpwn

by Teycir · MCP Server · ★ 21

About Mcpwn

Automated security scanner for Model Context Protocol servers that detects RCE, path traversal, prompt injection, and protocol vulnerabilities.

cybersecuritymcpmcp-serversecurity

Quick Facts

Stars21
Forks6
LanguagePython
CategoryMCP Server
LicenseMIT
Quality Score46.75/100
Last Updated2026-03-21
Created2025-12-12
Platformsmcp, python
Est. Tokens~9k

Compatible Skills

These tools work well together with Mcpwn for enhanced workflows:

  • openclaw-skills-security — semantic(0.25)+complementary+same_lang+similar_pop+shared_platform (59%)
  • whistleblower — semantic(0.24)+complementary+same_lang+similar_pop+shared_platform (54%)

More MCP Server Tools

Explore other popular mcp server tools:

View all MCP Server tools →

Popular Python Agent Tools

Frequently Asked Questions

What is Mcpwn?

Mcpwn is Automated security scanner for Model Context Protocol servers that detects RCE, path traversal, prompt injection, and protocol vulnerabilities.. It is categorized as a MCP Server with 21 GitHub stars.

What programming language is Mcpwn written in?

Mcpwn is primarily written in Python. It covers topics such as cybersecurity, mcp, mcp-server.

How do I install or use Mcpwn?

You can find installation instructions and usage details in the Mcpwn GitHub repository at github.com/Teycir/Mcpwn. The project has 21 stars and 6 forks, indicating an active community.

What license does Mcpwn use?

Mcpwn is released under the MIT license, making it free to use and modify according to the license terms.

View on GitHub → Browse MCP Server tools