27+ checks across transport security, authentication, MCP protocol compliance, injection risks, information disclosure, security headers, and rate limiting — paste a URL and get results in seconds.
NEWTry MCP Agent Studio
Your server passed the scan — now chat with Claude, Gemini or GPT using its tools live. No setup required.
A February 2026 security scan found over 8,000 MCP servers exposed on the public internet with no authentication. Any AI agent — or malicious actor — can connect to those servers, enumerate their tools, and call them without restriction.
Palo Alto Unit 42 published research in early 2026 identifying new attack vectors specific to MCP: tool poisoning (manipulating tool descriptions to hijack agent behavior) and sampling injection. Both require an attacker to first reach your server — authentication is your first line of defense.
This free scanner checks the most critical security properties of your MCP server and gives you a prioritized list of what to fix.
Access-Control-Allow-Origin: * means any website can make authenticated-looking requests to your server from a visitor's browser.Strict-Transport-Security: max-age=31536000 header in your server's response or in your reverse proxy config.* with your specific allowed origins, e.g. https://claude.ai or your application domain.X-Content-Type-Options: nosniff and X-Frame-Options: SAMEORIGIN can be added in a single middleware or proxy config block.For step-by-step implementation with code examples, read our guide on securing MCP servers with OAuth 2.1, Bearer tokens, and Cloudflare Access.
Credentials optional — add them to unlock deeper checks on auth-protected servers
27+ checks across 7 categories
Transport Security
HTTPS, TLS cert validity, HTTP redirect, HSTS
Authentication & Access
Auth enforcement, tools/list & resources/list exposure, OAuth 2.0 metadata, token validation*
MCP Protocol
Initialize handshake, unknown method error handling
Information Disclosure
Server headers, error verbosity, tool risk patterns, prompt injection in descriptions*
Injection & Exfiltration
Command injection, code injection, path traversal, SSRF, data exfiltration, IDOR*
Security Headers & CORS
CORS configuration, origin reflection
Resilience
10 concurrent requests — checks for 429 and rate-limit headers
* requires optional credentials