8 detection engines analyze your Model Context Protocol servers for secrets, prompt injection, supply chain risks, data exfiltration paths, schema rug pulls, and over-privileged tools — all in one scan.
claude_desktop_config.json, or upload a config file. Supports SSE and Streamable HTTP transports.| Code | Engine | What It Finds | Status |
|---|---|---|---|
| SDE | Secrets Scanner | API keys, tokens, passwords, and credentials hardcoded in MCP server configurations and environment variables. | LIVE |
| STA | Prompt Threat Detector | Hidden instructions, prompt injection, and jailbreak attempts embedded in tool descriptions and schema annotations. | LIVE |
| SIM | Schema Change Monitor | Rug pull attacks — tool definitions that silently mutate between scans to include malicious directives or expanded permissions. | LIVE |
| PPV | Package Risk Checker | Malicious npm and PyPI packages, typosquatting, unpinned dependency versions, and supply chain compromise indicators. | LIVE |
| COI | Cross-Server Threat Detector | Cross-origin influence attacks where one MCP server's tool manipulates, shadows, or overrides another server's behavior. | LIVE |
| DFP | Data Exfiltration Tracer | Data movement from sensitive sources to external sinks — mapping hidden exfiltration paths across tools and servers. | LIVE |
| CPA | Permission Overreach Scanner | Over-privileged tools requesting more capabilities than their stated purpose requires — scored per tool with alignment metrics. | LIVE |
| ASH | Input Attack Surface Analyzer | SQL injection, SSRF, command injection, path traversal, and template injection surfaces in tool parameter schemas. | LIVE |
PRAQTOR MCP-S gives you complete visibility into the tools your AI agents trust — before an attacker exploits them.