Security scanner for AI Agent skills, plugins, and MCP servers with A-F grading.
{
"mcpServers": {
"io-github-aidongise-cell-prism-scanner": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Security scanner for AI Agent skills, plugins, and MCP servers with A-F grading.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 2 days ago. 8 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Dynamic problem-solving through sequential thought chains
A Model Context Protocol server for searching and analyzing arXiv papers
An open-source AI agent that brings the power of Gemini directly into your terminal.
The official Python SDK for Model Context Protocol servers and clients
MCP Security Weekly
Get CVE alerts and security updates for io.github.aidongise-cell/prism-scanner and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Security scanner for AI Agent skills, plugins, and MCP servers.
Prism analyzes code for malicious behavior before you install it — and checks your system for leftover threats after you uninstall.
Unlike marketplace-only trust scores, Prism gives you full lifecycle coverage with code-level transparency — pre-install, runtime, and post-uninstall — across every platform, completely open source.
.env files, private keys, IDE configs, and package-manager credentials before they ship. Inspired by Anthropic's April 2026 source-map leak that exposed 512K lines of Claude Code internals via npm. Wire it into your CI:
prism scan ./dist --fail-on high
prism --version reported 0.1.3 after upgrading to 0.2.1); detection behavior is identical to v0.2.1.| | Marketplace Trust Scores | Prism Scanner | |--------------------|:------------------------:|:-----------------:| | Pre-install | :white_check_mark: Reputation score | :white_check_mark: Deep code analysis | | Post-uninstall | :x: | :white_check_mark: Residue & persistence scan | | Inspection | Black-box rating | Code-level, rule-by-rule | | Platforms | Single ecosystem | ClawHub, MCP, npm, pip | | Source | Closed | Open (Apache 2.0) | | Execution | Requires upload | Local-first, offline OK |
pip install prism-scanner
# Scan a local skill directory
prism scan ./my-skill/
# Scan a GitHub repo directly
prism scan https://github.com/user/skill-repo
# Check your system for agent residue
prism clean --scan
# Generate a cleanup plan (non-destructive)
prism clean --plan
# Execute cleanup with automatic backups
prism clean --apply
brew tap prismlab/tools
brew install prism-scanner
npx prism-scanner scan https://github.com/user/skill-repo
Add Prism to your CI pipeline — findings appear in GitHub's Security tab:
# .github/workflows/prism-scan.yml
name: Prism Security Scan
on: [push, pull_request]
permissions:
security-events: write
contents: read
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: aidongise-cell/prism-scanner@mai
... [View full README on GitHub](https://github.com/aidongise-cell/prism-scanner#readme)