AI security layer: code scanning, PII detection, prompt injection, secrets, CVEs
AI security layer: code scanning, PII detection, prompt injection, secrets, CVEs
Is it safe?
No known CVEs for guardianshield.
No authentication — any process on your machine can connect to this server.
License not specified.
Last scanned 0 days ago.
Is it maintained?
Last commit 31 days ago. 2 GitHub stars.
Will it work with my client?
Transport: stdio, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
How much context will it use?
27 tools. Estimated ~900 tokens of your context window (0.4% of 200K). Consider loading selectively — this is a heavy server.
What if it doesn't work?
Common issues: JSON syntax errors in config, Python version mismatch, network or firewall blocking. Setup guide covers troubleshooting. Or check GitHub issues for known problems.
{
"mcpServers": {
"io-github-sparkvibe-io-guardianshield": {
"args": [
"guardianshield"
],
"command": "uvx"
}
}
}Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
uvx guardianshield 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
scan_codeScan source code for vulnerabilities and hardcoded secrets
scan_fileScan a single file (auto-detects language from extension)
scan_directoryRecursively scan a directory with filtering and progress streaming
scan_inputCheck user/agent input for prompt injection attempts
scan_outputCheck AI output for PII leaks and content violations
check_secretsDetect hardcoded secrets and credentials
scan_filesScan multiple files in one call
scan_diffParse unified diff and scan only added lines
check_dependenciesCheck packages for known CVEs via OSV.dev (PyPI, npm, Go, Packagist)
sync_vulnerabilitiesSync the local OSV vulnerability database
Last scanned 2h ago
No known vulnerabilities.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.