18 checks across transport security, authentication, MCP protocol compliance, information disclosure, security headers, and rate limiting — paste a URL and get results in seconds.
A February 2026 security scan found over 8,000 MCP servers exposed on the public internet with no authentication. Any AI agent — or malicious actor — can connect to those servers, enumerate their tools, and call them without restriction.
Palo Alto Unit 42 published research in early 2026 identifying new attack vectors specific to MCP: tool poisoning (manipulating tool descriptions to hijack agent behavior) and sampling injection. Both require an attacker to first reach your server — authentication is your first line of defense.
This free scanner checks the most critical security properties of your MCP server and gives you a prioritized list of what to fix.
Access-Control-Allow-Origin: * means any website can make authenticated-looking requests to your server from a visitor's browser.Strict-Transport-Security: max-age=31536000 header in your server's response or in your reverse proxy config.* with your specific allowed origins, e.g. https://claude.ai or your application domain.X-Content-Type-Options: nosniff and X-Frame-Options: SAMEORIGIN can be added in a single middleware or proxy config block.For step-by-step implementation with code examples, read our guide on securing MCP servers with OAuth 2.1, Bearer tokens, and Cloudflare Access.
18 checks across transport, auth, MCP protocol, disclosure, headers, and resilience — no credentials required
18 checks across 6 categories
Transport Security
HTTPS, TLS cert validity, HTTP redirect, HSTS
Authentication & Access
Unauthenticated GET, auth scheme, tools/list exposure
MCP Protocol
Initialize handshake, unknown method error handling
Information Disclosure
Server headers, error verbosity, tool risk patterns
Security Headers & CORS
CORS, origin reflection, X-Frame-Options, CSP
Resilience
10 concurrent requests — checks for 429 and rate-limit headers