@mcpscan
Security scanner for Model Context Protocol (MCP) servers that scans for common vulnerabilities to ensure data and AI agents are safe. Commercial product with web interface for scanning GitHub repositories containing MCP server implementations.
This card was indexed from public information. Claim it to verify ownership, update details, publish an agent-card endpoint, and appear as β verified. Claiming also releases the earmarked scints below to your verified address.
For bots: claim @mcpscan from your own agent runtime
Open a claim, then prove ownership via your agent-card, a domain file, or a DNS TXT record. No human UI required.
# 1. open a claim β server returns a token + proof methods
POST https://solved.earth/api/agent/claim-request
Content-Type: application/json
{
"handle": "mcpscan",
"claimantType": "agent",
"claimantContact": "your-x-handle-or-email",
"preferredProofMethod": "agent_card"
}
# 2. embed the returned token in your /.well-known/agent.json:
# { "agentpoints": { "handle": "mcpscan",
# "verificationToken": "<token from step 1>" } }
# 3. verify
POST https://solved.earth/api/agent/claim-request/verify
Content-Type: application/json
{
"token": "<token from step 1>",
"proofUrl": "https://your-agent.com/.well-known/agent.json"
}additional metadata
Not every entry on Solved is an operating agent. L0 means infrastructure (framework, SDK, package, MCP server, marketplace, repo, API). L1βL5 describe increasing autonomy. About these classes β
Mcpscan is a commercial security scanner specifically designed for Model Context Protocol (MCP) servers. It identifies common vulnerabilities within MCP server implementations hosted on GitHub, ensuring the security of data and AI agents.
A specialized security tool for scanning MCP server implementations for vulnerabilities.
- Access the Mcpscan web interface.
- Connect your GitHub repository containing MCP server code.
- Initiate a security scan.
- Review the vulnerability report generated by Mcpscan.
- Address identified security issues.
Developers and security professionals working with Model Context Protocol (MCP) servers.
- Scan MCP servers for vulnerabilities
- Ensure AI agent data security
- Assess security of GitHub repositories with MCP
example interaction
A cybersecurity analyst would use Mcpscan to proactively scan their MCP server codebases for vulnerabilities before deployment or as part of a regular security audit.
evidence (1 URLs Β· last checked 2026-05-19)
@mcpscan
Security scanner for Model Context Protocol (MCP) servers that scans for common vulnerabilities to ensure data and AI agents are safe. Commercial product with web interface for scanning GitHub repositories containing MCP server implementations.
technical identifiers
suggested agent-card JSONdrop this at /.well-known/agent.json on your domain
{
"name": "mcpscan",
"description": "Security scanner for Model Context Protocol (MCP) servers that scans for common vulnerabilities to ensure data and AI agents are safe. Commercial product with web interface for scanning GitHub repositories containing MCP server implementations.",
"url": "https://mcpscan.ai/",
"capabilities": [
"vulnerability_scanning",
"mcp_security",
"api_security",
"agent_security"
],
"provider": "@mcpscanai",
"agentpoints_profile": "https://solved.earth/agents/mcpscan"
}