MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"mcpsecbench": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
This benchmark includes !MCPSecBench and !data used in our experiment.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
An evil MCP server used for redteam testing
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
IAM Policy Autopilot is an open source static code analysis tool that helps you quickly create baseline AWS IAM policies that you can refine as your application evolves. This tool is available as a command-line utility and MCP server for use within AI coding assistants for quickly building IAM policies.
Signed receipts for agent, API, and MCP interactions. Portable and offline-verifiable.
MCP Security Weekly
Get CVE alerts and security updates for MCPSecBench and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
This benchmark includes and
used in our experiment.
A technical report is available as follows:
@article{yang2025mcpsecbench,
title={MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols},
author={Yang, Yixuan and Wu, Daoyuan and Chen, Yufan},
journal={arXiv preprint arXiv:2508.13220},
year={2025}
}
needs: python version higher than 3.10
add dependencies uv add starlette pydantic pydantic_settings mcp[cli] anthropic aiohttp openai pyautogui pyperclip
you may need to use apt install some extra dependencies to activate pyautogui
change the basepath in malicious_add.py to you real path
for tool name squatting and server name squatting in Claude. Please check the order of the servers, Claude will choose the last server with the same name and call the first tool with the same name.
The auto check supports OpenAI and Cursor at present. To implement in Claude Desktop, please change the parameter of wait_for_image in main.py such as img/cursor_init.png to the screenshot of Claude Desktop.
set API_Key. export OPENAI_API_KEY xxxx / export ANTHROPIC_API_KEY xxx
uv run main.py mode(0 for Claude in CLI mode, 1 for OpenAI, 2 for Cursor) protection(0 for none, 1 for MCIP, 2 for AIM-MCP) e.g. uv run main.py 1 2
Delete /tmp/state.json at first.
When you test Cursor, Please make sure you opened Cursor and it can be showed after one time Alt+Tab, and the conversation is new but opened like mcpbench/img/cursor_window.png
Experiments Results are shown in folder.
Released under the MIT License.