01Provides structured reports with severity-rated findings, matched patterns, and line numbers.
02Operates locally and deterministically, requiring no network access or cloud dependencies.
03Comprehensive threat coverage with 138 rules across 15 categories (e.g., Prompt injection, Credential leak, Exfiltration).
04Scans text content (skill descriptions, tool definitions) for security threats.
050 GitHub stars
06Analyzes MCP server configurations for dangerous patterns and insecure settings.