mcpsec

by manthanghasadiya · MCP Server · ★ 21

About mcpsec

An AI-driven dynamic protocol fuzzer for the Model Context Protocol (MCP). Prove runtime exploitability by discovering state violations, transport crashes, and application-layer logic flaws (SSRF, LFI) before your AI agents do.

ai-securityappseccybersecurityfuzzermcpmcp-servermcp-toolsmodel-context-protocolpentestingssrf

Quick Facts

Stars21
Forks3
LanguagePython
CategoryMCP Server
LicenseMIT
Quality Score36.4/100
Last Updated2026-04-25
Created2026-02-18
Platformsaws, mcp, python
Est. Tokens~152k

More MCP Server Tools

Explore other popular mcp server tools:

View all MCP Server tools →

Popular Python Agent Tools

Frequently Asked Questions

What is mcpsec?

mcpsec is An AI-driven dynamic protocol fuzzer for the Model Context Protocol (MCP). Prove runtime exploitability by discovering state violations, transport crashes, and application-layer logic flaws (SSRF, LFI. It is categorized as a MCP Server with 21 GitHub stars.

What programming language is mcpsec written in?

mcpsec is primarily written in Python. It covers topics such as ai-security, appsec, cybersecurity.

How do I install or use mcpsec?

You can find installation instructions and usage details in the mcpsec GitHub repository at github.com/manthanghasadiya/mcpsec. The project has 21 stars and 3 forks, indicating an active community.

What license does mcpsec use?

mcpsec is released under the MIT license, making it free to use and modify according to the license terms.

View on GitHub → Browse MCP Server tools