MCPSafe.io
RegistryThreatsMethodologyDocsPricingScanSign in
MCPSafe.io

Security checks for MCP servers — public packages and private repos, fast or deep.

Legal

Privacy PolicyCookie PolicyTerms of ServiceSecurity disclosure

Resources

State of MCP SecuritySupportSystem statusMade in Germany 🇩🇪

© 2026 MCPSafe. All rights reserved.

GDPR — Privacy Policy

Threat Catalog

The MCP Security Threat Catalog

Every detection rule MCPSafe ships. Each entry maps to a CWE and a severity tier, and links to a page with explanation and detection notes. Paste an MCP server on the scan page to run the whole catalog against it.

91 rules · Last updated 2026-05-13T19:10:20Z

Rule IDNameDescriptionSeverityCWEScan type
MCP-221hyperlink-injection-in-outputFlags MCP tool implementations that build hyperlink URLs byHIGHCWE-79Fast
MCP-222html-in-tool-outputFlags MCP tool implementations that return HTML content withoutHIGHCWE-79Fast
MCP-223unicode-tag-smugglingFlags MCP source files that contain code points from the UnicodeHIGHCWE-1007Fast
MCP-230jwt-verify-disabledFlags JWT verification anti-patterns:HIGHCWE-347Fast
MCP-231jwt-no-expirationFlags JWT sign / encode calls where the payload literal does notMEDIUMCWE-613Fast
MCP-232hardcoded-crypto-keyFlags crypto primitives initialised with a string-literal key:HIGHCWE-798Fast
MCP-233tls-verify-disabledFlags outbound HTTP / network clients with TLS certificateHIGHCWE-295Fast
MCP-234session-in-localStorageFlags any write to `localStorage` or `sessionStorage` whose keyHIGHCWE-922Fast
MCP-235csrf-missing-on-state-changeFlags files that register a state-changing HTTP route (POST /MEDIUMCWE-352Deep
MCP-240unpinned-github-actionsFlags GitHub Actions workflow files (`.github/workflows/*.yml` andMEDIUMCWE-1357Fast
MCP-250toctou-file-accessFlags time-of-check-to-time-of-use (TOCTOU) races: a path-existenceMEDIUMCWE-367Deep
MCP-251pii-in-logsFlags identifiers whose names indicate PII (email, ssn, phone,MEDIUMCWE-532Deep
MCP-252tool-description-budget-bombFlags MCP tool registrations whose `description` literal exceedsMEDIUMCWE-770Fast
MCP-260confused-deputy-no-per-client-consentCloses the official MCP security best practices "Confused Deputy"HIGHCWE-441Deep
MCP-261redirect-uri-non-exact-matchCloses the official MCP security best practices Confused DeputyHIGHCWE-601Fast
MCP-262oauth-state-missing-or-lateCloses the official MCP security best practices Confused DeputyHIGHCWE-352Deep
MCP-263consent-cookie-weakCloses the official MCP security best practices Confused DeputyMEDIUMCWE-1004Fast
MCP-264consent-ui-clickjackableCloses the official MCP security best practices Confused DeputyMEDIUMCWE-1021Fast
MCP-265token-passthroughCloses the official MCP security best practices "Token Passthrough"HIGHCWE-345Deep
MCP-266session-not-bound-to-userCloses the official MCP security best practices "Session Hijacking"MEDIUMCWE-384Fast
MCP-267predictable-session-idCloses the official MCP security best practices Session HijackingHIGHCWE-330Fast
MCP-268local-http-transport-no-authCloses the official MCP security best practices "Local MCP ServerHIGHCWE-306Deep
MCP-269wildcard-oauth-scopesCloses the official MCP security best practices Scope MinimizationMEDIUMCWE-272Fast
MCP-270sampling-hidden-prompt-injectionCloses the Unit42 "Resource Theft via Hidden Prompts" attack onHIGHCWE-94Deep
MCP-271persistent-injection-via-tool-outputCloses the Unit42 "Conversation Hijacking via Persistent PromptMEDIUMCWE-94Deep

Showing 51–75 of 91 rules

«‹3›

Scan a server for these issues

MCPSafe detects every issue in this catalog automatically. Paste an MCP server’s GitHub URL or package name on the scan page.

Scan now