Scan installed MCP servers for security vulnerabilities with 16 detection engines.
uvx mcpampel{
"MCPAMPEL_API_KEY": "YOUR_SECRET_VALUE"
}Add this server entry to the mcpServers object in your Claude Desktop config, then restart the app.
{
"mcpServers": {
"io-github-diemoeve-mcpampel": {
"command": "uvx",
"args": [
"mcpampel"
],
"env": {
"MCPAMPEL_API_KEY": "YOUR_SECRET_VALUE"
}
}
}
}~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNo remote HTTP endpoint is advertised. Use the package or stdio setup shown in Install.
MCPAmpel - MCP Security Scanner is an MCP server for Scan installed MCP servers for security vulnerabilities with 16 detection engines.. It supports STDIO transport.
Use the generated config in Install. This server runs with uvx mcpampel; add any required environment variables before starting your client.
Choose the Claude Desktop tab in Install and copy the config for uvx mcpampel. Add required environment variables before starting Claude Desktop.
Choose the Claude Code tab in Install and copy the config for uvx mcpampel. Add required environment variables before starting Claude Code.
Choose the Codex tab in Install and copy the config for uvx mcpampel. Add required environment variables before starting Codex.
Choose the Cursor or VS Code tab in Install and copy the config for uvx mcpampel. Add required environment variables before starting Cursor or VS Code.
MCPAmpel - MCP Security Scanner uses STDIO transport. Use the package or command config in Install.
MCPAmpel - MCP Security Scanner inventory is listed when the MCP endpoint exposes tools, resources, or prompts. Some servers require auth first.
MCPAmpel - MCP Security Scanner is marked with Auth required by registry metadata auth. You may need provider login, an API key, a bearer token, or a session header.
| Package | Registry | Version | Inputs |
|---|---|---|---|
mcpampelstdio | pypi | 0.2.2 | Env: MCPAMPEL_API_KEY required secret |