DEV Community

mcp-fortress
mcp-fortress

Posted on

I Scanned 13 Popular MCP Servers. Here's What I Found. πŸ”

mcp security scan report


Model Context Protocol (MCP) servers are becoming essential tools for AI workflows. But with great power comes great security risk.

I just finished scanning 13 of the most popular MCP servers using mcp-fortress, an open-source security scanner I built for the MCP ecosystem.

Here's what every MCP user needs to know.

🚨 The First Malicious MCP Server

Before I even started scanning, security researchers at Semgrep and Snyk discovered postmark-mcp - the first confirmed malicious MCP server on npm.

What it did: Added a hidden BCC to all emails sent through AI agents, silently harvesting every email.

Why it matters: This proves MCP servers are already being weaponized. It won't be the last.

πŸ“Š What I Scanned

I scanned 13 packages including:

Official Anthropic Servers:

  • @modelcontextprotocol/server-filesystem
  • @modelcontextprotocol/server-puppeteer
  • @modelcontextprotocol/server-github
  • @modelcontextprotocol/server-slack
  • ...and more

Popular Third-Party Servers:

  • mcp-framework (80+ projects depend on it)
  • mcp-use (complete MCP framework)
  • @contentful/mcp-server
  • ...and more

βœ… The Good News

All official @modelcontextprotocol servers are exceptionally secure:

  • 0 CVEs found
  • Minimal dependencies (<15 for most)
  • No suspicious patterns
  • Regular updates

Verdict: Trust and use official servers with confidence.

⚠️ The Concerning Patterns

Undisclosed Telemetry

mcp-use makes 6 external network requests to:

  • PostHog (analytics)
  • Langfuse (LLM tracking)
  • Scarf (package analytics)
  • Vendor cloud

Issue: Not disclosed in documentation. Users should know their AI interactions are being tracked.

Dependency Risk

Package Dependencies Risk
mcp-use 47 Medium
@modelcontextprotocol/sdk 37 Low
mcp-framework 27 Low

More dependencies = more supply chain attack surface.

πŸ›‘οΈ How to Protect Yourself

1. Scan Before Installing

# Quick scan
npx mcp-fortress scan @modelcontextprotocol/server-github

# Install tool
npm install -g mcp-fortress
Enter fullscreen mode Exit fullscreen mode

2. Check These Red Flags

🚩 Published < 1 week ago
🚩 0 downloads or GitHub stars
🚩 No source code repository
🚩 Typosquatting names
🚩 300+ dependencies
🚩 Undisclosed external requests

3. Use Sandbox Environments

Test new MCP servers in isolated VMs/containers before giving production access.

🎯 Key Takeaways

  1. Official servers are safe - use them with confidence
  2. Third-party servers need scrutiny - scan before installing
  3. Malicious servers exist - postmark-mcp proves this
  4. Always scan packages - npx mcp-fortress scan <package>

🌐 What Needs to Happen

The MCP ecosystem needs:

  • Security guidelines for developers
  • Vetting process for popular servers
  • Transparency requirements (disclose telemetry)
  • Built-in scanning in Claude Desktop, Cursor, etc.

We're in the "npm 10 years ago" phase. Let's not repeat the same security mistakes.

🏰 About MCP Fortress

mcp-fortress is a free, open-source security scanner for MCP servers that works three ways:

1️⃣ CLI Tool

npm install -g mcp-fortress
mcp-fortress scan @modelcontextprotocol/server-github
Enter fullscreen mode Exit fullscreen mode

2️⃣ MCP Server (Scan from Claude Desktop)

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "mcp-fortress": {
      "command": "mcp-fortress",
      "args": ["serve-mcp"]
    }
  }
}
Enter fullscreen mode Exit fullscreen mode

Now you can ask Claude: "Scan the puppeteer MCP server for vulnerabilities"

3️⃣ Claude Code Plugin

Install the MCP Fortress plugin in Claude Code to scan MCP servers directly from your coding environment.

Features:

  • βœ… Scans for CVEs via OSV database
  • βœ… Detects dangerous code patterns (eval, exec, etc.)
  • βœ… Finds undisclosed external requests
  • βœ… Analyzes dependency risks
  • βœ… Scores security risk
  • βœ… Detects prompt injection attempts
  • βœ… Identifies tool poisoning

Use it however you want:

  • CLI: Quick terminal scans
  • MCP Server: Integrate into your AI workflow
  • Claude Code Plugin: Scan while you code

Links:


What do you think about MCP security? Share your thoughts in the comments!

If you found this valuable, star the repo and spread the word. Security is a team sport.

Top comments (0)