Audit MCP servers from inside Claude Code. 10 OWASP checks, A-F grade, live leaderboard.
{
"mcpServers": {
"io-github-lazymac2x-mcpwatch": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Audit MCP servers from inside Claude Code. 10 OWASP checks, A-F grade, live leaderboard.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 0 days ago.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
A Model Context Protocol (MCP) server and CLI that provides tools for agent use when working on iOS and macOS projects.
Dynamic problem-solving through sequential thought chains
A Model Context Protocol server for searching and analyzing arXiv papers
The Apify MCP server enables your AI agents to extract data from social media, search engines, maps, e-commerce sites, or any other website using thousands of ready-made scrapers, crawlers, and automation tools available on the Apify Store.
MCP Security Weekly
Get CVE alerts and security updates for io.github.lazymac2x/mcpwatch and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Have I Been Pwned for MCP servers. Continuously audits every public MCP server on the internet — security + performance — and publishes a public letter-grade leaderboard.
Status: MVP in progress · launching 2026-04-13
MCPWatch fills that gap.
mcpwatch.dev — letter grades A–F, searchable, historical diffsnpx @mcpwatch/cli audit <server> — local scan before you install| # | Check | Severity |
|---|---|---|
| 1 | Command injection in tool handlers | Critical |
| 2 | Path traversal in file tools | Critical |
| 3 | Unauthenticated mutations | Critical |
| 4 | Prompt injection via tool descriptions | High |
| 5 | SSRF in URL-fetching tools | High |
| 6 | Secret leakage in error messages | High |
| 7 | Over-permissive filesystem scopes | Medium |
| 8 | Missing rate limits | Medium |
| 9 | Outdated dependencies with known CVEs | Medium |
| 10 | Missing schema validation on inputs | Low |
mcpwatch/
├── packages/
│ ├── scanner/ # Core check engine (TypeScript, runs in Worker + CLI + Node)
│ └── cli/ # @mcpwatch/cli — npx runnable
├── workers/
│ └── crawler/ # CF Worker — scheduled crawl + scan job
├── apps/
│ └── web/ # Next.js/Astro static → CF Pages — mcpwatch.dev
├── content/ # Launch blog, HN post, X thread
└── scripts/ # One-shot bootstrap + data backfill
MIT — use it, fork it, contribute checks.