MCP proxy adding security scanning, behavioral profiling, risk gating, and safe tool call execution.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"io-github-gautamvarmadatla-mcpsafetywarden": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
MCP proxy adding security scanning, behavioral profiling, risk gating, and safe tool call execution.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
AI agents get on-chain identity, credentials, reputation, escrow, and persistent memory on XRPL.
MCP server for using the REMnux malware analysis toolkit via AI assistants
MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public.
Search, evaluate, and compare 17,000+ MCP servers — each scored on security, maintenance, and efficiency.
MCP Security Weekly
Get CVE alerts and security updates for io.github.gautamvarmadatla/mcpsafetywarden and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
MCP safety warden is a proxy server that wraps any MCP server and adds behavioral profiling, security scanning, risk gating, and safe execution to its tools.
Listed on the official MCP server registry - discoverable by any MCP-compatible client.
Most MCP servers expose tools with no information about what those tools actually do at runtime: whether they write data, call external services, delete things, or produce outputs that contain adversarial content.
Instead of calling a wrapped server's tools directly, you route calls through this wrapper. It classifies each tool, builds a behavior profile from observed runs, checks for injection attacks, and blocks or gates risky tools before they execute.
Behavioral profiling
Security scanning
scan_all_servers.quick_scan, vulnerability_scan, and traceroute run against the target host at the start of the pipeline. The results are embedded in the Recon output so the Planner can ground its attack hypotheses in real port and service data rather than guessing from tool schemas alone.