MCP Hub
Back to servers

agent-bom

AI supply chain security scanner — CVE scanning, blast radius, policy enforcement, SBOM generation

Registry
Stars
1
Updated
Feb 24, 2026

Quick Install

uvx agent-bom

agent-bom

Build PyPI Docker License OpenSSF Stars

AI Bill of Materials generator. CVE scanning for AI agents and MCP servers. Blast radius mapping. Privilege detection. OWASP LLM Top 10 + MITRE ATLAS + NIST AI RMF.

agent-bom architecture

Blast radius attack surface


Why agent-bom?

Grype tells you a package has a CVE. agent-bom tells you which AI agents are compromised, which credentials leak, which tools an attacker reaches, and what the business impact is.

CVE-2025-1234  (CRITICAL · CVSS 9.8 · CISA KEV)
  └─ better-sqlite3@9.0.0  (npm)
       └─ sqlite-mcp  (MCP Server · unverified · 🛡 root)
            ├─ Cursor IDE  (Agent · 4 servers · 12 tools)
            ├─ ANTHROPIC_KEY, DB_URL, AWS_SECRET  (Credentials exposed)
            └─ query_db, read_file, write_file, run_shell  (Tools at risk)

 Fix: upgrade better-sqlite3 → 11.7.0
Grype / Syft / Trivyagent-bom
Package CVE detectionYesYes — OSV + NVD CVSS v4 + EPSS + CISA KEV
SBOM generationYes (Syft)Yes — CycloneDX 1.6, SPDX 3.0, SARIF
AI agent discovery13 MCP clients + Docker Compose auto-discovered
Blast radius mappingCVE → package → server → agent → credentials → tools
Credential exposureWhich secrets leak per vulnerability, per agent
MCP tool reachabilityWhich tools an attacker reaches post-exploit
Privilege detectionruns_as_root, shell_access, container_privileged, per-tool permissions
Enterprise remediationNamed assets, impact percentages, risk narratives
Triple-framework taggingOWASP LLM Top 10 + MITRE ATLAS + NIST AI RMF
Policy-as-codeBlock unverified servers, enforce thresholds in CI/CD
427+ server MCP registryRisk levels, tool inventories, auto-synced weekly

What it scans:

SourceHow
MCP configsAuto-discover (13 clients + Docker Compose)
Docker imagesGrype / Syft / Docker CLI fallback
Kuberneteskubectl across namespaces
Cloud providersAWS, Azure, GCP, Databricks, Snowflake, Nebius
Terraform / GitHub ActionsAI resources + env vars
AI platformsHuggingFace, W&B, MLflow, OpenAI
Jupyter notebooksAI library imports + model refs
Model files13 formats (.gguf, .safetensors, .pkl, ...)
Skill filesCLAUDE.md, .cursorrules, AGENTS.md
Prompt templates.prompt, .promptfile, prompt.yaml
Ollama modelsLocal inventory via API + manifests
Existing SBOMsCycloneDX / SPDX import

What it outputs:

Console, HTML dashboard, SARIF, CycloneDX 1.6, SPDX 3.0, Prometheus, OTLP, JSON, REST API

Read-only guarantee: Never writes configs, never runs servers, never stores secrets. All API calls are read-only. See PERMISSIONS.md.

Ecosystem:

PlatformLink
PyPIpip install agent-bom
Dockerdocker run agentbom/agent-bom scan
GitHub Actionuses: msaad00/agent-bom@v0.31.0
MCP Registryserver.json
ToolHiveregistry entry
OpenClawSKILL.md
Smitherysmithery.yaml
RailwayDockerfile.sse

Enterprise deployment topology


Get started

pip install agent-bom

agent-bom scan                                     # auto-discover + scan
agent-bom scan --enrich                            # + NVD CVSS + EPSS + CISA KEV
agent-bom scan -f html -o report.html              # HTML dashboard
agent-bom scan --fail-on-severity high -q          # CI gate
agent-bom scan --image myapp:latest                # Docker image scanning
agent-bom scan --k8s --all-namespaces              # K8s cluster
agent-bom scan --aws --snowflake --databricks      # Multi-cloud

Auto-discovers Claude Desktop, Claude Code, Cursor, Windsurf, Cline, VS Code Copilot, Continue, Zed, Cortex Code, OpenClaw, ToolHive, Docker MCP Toolkit, and VS Code native MCP.

Install extras
ModeCommand
Core CLIpip install agent-bom
Cloud (all)pip install 'agent-bom[cloud]'
AWSpip install 'agent-bom[aws]'
Snowflakepip install 'agent-bom[snowflake]'
Databrickspip install 'agent-bom[databricks]'
Nebius GPU cloudpip install 'agent-bom[nebius]'
REST APIpip install 'agent-bom[api]'
Dashboardpip install 'agent-bom[ui]'
AI enrichmentpip install 'agent-bom[ai-enrich]'
MCP serverpip install 'agent-bom[mcp-server]'
OpenTelemetrypip install 'agent-bom[otel]'
Dockerdocker run --rm -v ~/.config:/root/.config:ro agentbom/agent-bom scan

Core capabilities

CVE scanning + blast radius

Every vulnerability is mapped through your AI stack: which agents are affected, which credentials are exposed, which MCP tools an attacker can reach, and what to fix first.

Enrichment sources: OSV batch (primary), NVD CVSS v4, FIRST EPSS exploit probability, CISA KEV active exploitation catalog.

Privilege detection

Every MCP server is assessed for privilege escalation risk:

SignalDetection
runs_as_rootsudo in command/args, Docker Config.User empty/"0"/"root"
shell_accessbash/sh/zsh/powershell command, exec/shell tools
container_privilegedDocker HostConfig.Privileged, CapAdd/CapDrop
tool_permissionsPer-tool read/write/execute/destructive classification

Privilege levels: critical (privileged container, CAP_SYS_ADMIN) → high (root, shell) → medium (fs write, network) → low (read-only).

Triple-framework threat mapping

Every finding is tagged against three frameworks simultaneously:

  • OWASP LLM Top 10 — LLM01 through LLM10 (6 categories triggered)
  • MITRE ATLAS — AML.T0010, AML.T0043, AML.T0051, etc. (8 techniques mapped)
  • NIST AI RMF 1.0 — Govern, Map, Measure, Manage (12 subcategories mapped)

Enterprise remediation

Each fix tells you exactly what will be protected — named agents, credentials, tools, percentages, threat tags, and risk narratives.

AI-BOM export

agent-bom scan -f cyclonedx -o ai-bom.cdx.json   # CycloneDX 1.6
agent-bom scan -f spdx -o ai-bom.spdx.json       # SPDX 3.0
agent-bom scan -f sarif -o results.sarif           # GitHub Security tab
agent-bom scan -f json -o ai-bom.json             # Full AI-BOM
agent-bom scan -f html -o report.html              # Interactive dashboard

Policy-as-code

agent-bom scan --policy policy.json --fail-on-severity high

Cloud provider discovery

agent-bom scan --aws --aws-region us-east-1       # Bedrock, Lambda, EKS, ECS, SageMaker, EC2
agent-bom scan --snowflake                         # Cortex Agents, MCP Servers, Search, Snowpark
agent-bom scan --databricks                        # Cluster libraries, model serving
agent-bom scan --nebius --nebius-project-id proj   # GPU cloud K8s + containers
agent-bom scan --k8s --context=coreweave-cluster   # CoreWeave / any K8s
Cloud provider details
ProviderWhat's discoveredInstall
AWSBedrock agents, Lambda, EKS, Step Functions, EC2, ECS, SageMakerpip install 'agent-bom[aws]'
SnowflakeCortex Agents, native MCP Servers, Search, Snowpark, Streamlit, query historypip install 'agent-bom[snowflake]'
DatabricksCluster packages, model serving endpointspip install 'agent-bom[databricks]'
AzureAI Foundry agents, Container Appspip install 'agent-bom[azure]'
GCPVertex AI endpoints, Cloud Runpip install 'agent-bom[gcp]'
NebiusManaged K8s, container servicespip install 'agent-bom[nebius]'
CoreWeaveK8s-native — --k8s --context=coreweave-cluster(core CLI)
OllamaLocal model inventory via API + manifests(core CLI)

Additional capabilities

MCP runtime introspection

Connect to live servers to discover runtime tools/resources and detect drift from configs. Read-only — only calls tools/list and resources/list.

agent-bom scan --introspect
Skill file scanning + security audit

Scan CLAUDE.md, .cursorrules, AGENTS.md for embedded MCP servers, packages, and credentials. 7 security checks: typosquat detection, shell access, dangerous server names, unverified servers, excessive credentials, external URLs, unknown packages.

agent-bom scan --skill CLAUDE.md    # explicit
agent-bom scan --skill-only         # skills only
agent-bom scan --no-skill           # skip skills
Prompt template scanning

Scan .prompt, .promptfile, system_prompt.*, prompt.yaml/json files for hardcoded secrets, prompt injection patterns, unsafe instructions, and sensitive data exposure.

agent-bom scan --scan-prompts
AI-powered enrichment

LLM-generated risk narratives, executive summaries, and threat chain analysis. Works with local Ollama (free) or 100+ providers via litellm.

agent-bom scan --ai-enrich                              # auto-detect Ollama
agent-bom scan --ai-enrich --ai-model ollama/llama3      # specific model
agent-bom scan --ai-enrich --ai-model openai/gpt-4o-mini # cloud LLM
Jupyter notebook + model file scanning

Detect 29+ AI libraries, pip installs, credentials in notebooks. Scan 13 model file formats with security flags for pickle-based formats.

agent-bom scan --jupyter ./notebooks
agent-bom scan --model-files ./models
Attack flow visualization

CLI attack flow tree, interactive HTML graphs (Cytoscape.js), per-CVE React Flow diagrams via REST API.

agent-bom scan --aws -f graph -o graph.json   # export graph data

Deployment

ModeCommandBest for
CLIagent-bom scanLocal audit
Pre-install checkagent-bom check express@4.18.2 -e npmBefore running MCP servers
GitHub Actionuses: msaad00/agent-bom@v0.31.0CI/CD + SARIF
Dockerdocker run agentbom/agent-bom scanIsolated scans
REST APIagent-bom apiDashboards, SIEM
MCP Serveragent-bom mcp-serverInside any MCP client
Dashboardagent-bom serveTeam UI
Prometheus--push-gateway / --otel-endpointMonitoring

GitHub Action

- uses: msaad00/agent-bom@v0.31.0
  with:
    severity-threshold: high
    upload-sarif: true
    enrich: true
    fail-on-kev: true

REST API

pip install agent-bom[api]
agent-bom api --api-key $SECRET --rate-limit 30   # http://127.0.0.1:8422/docs
EndpointDescription
POST /v1/scanStart async scan
GET /v1/scan/{id}Results + status
GET /v1/scan/{id}/attack-flowPer-CVE blast radius graph
GET /v1/registry427+ server registry

MCP Server

pip install agent-bom[mcp-server]
agent-bom mcp-server                    # stdio
agent-bom mcp-server --transport sse    # remote

8 tools: scan, check, blast_radius, policy_check, registry_lookup, generate_sbom, compliance, remediate

Cloud UI

cd ui && npm install && npm run dev   # http://localhost:3000

Security posture dashboard, vulnerability explorer, attack flow diagrams, supply chain graph, registry browser, enterprise scan form.


MCP Server Registry (427+ servers)

Curated registry of 427+ known MCP servers with risk levels, tool inventories, credential env vars, categories, and version pins. Auto-synced weekly from the Official MCP Registry. Unverified servers trigger warnings. Policy rules can block them in CI.

Browse: mcp_registry.json | Expand: python scripts/expand_registry.py


AI supply chain coverage

LayerCoverageExamples
GPU clouds--k8sCoreWeave, Lambda Labs, Paperspace
AI platformsCloud modulesBedrock, Vertex AI, Snowflake Cortex, Databricks
Containers--imageNVIDIA NIM, vLLM, Ollama, any OCI image
AI frameworksDependency scanLangChain, LlamaIndex, AutoGen, PyTorch
MCP ecosystemAuto-discovery + registry13 clients, 427+ servers
LLM providersAPI key + SDK detectionOpenAI, Anthropic, Cohere, Mistral
IaC + CI/CD--tf-dir, --ghaTerraform AI resources, GitHub Actions

Trust & permissions

  • --dry-run — preview every file and API URL before access
  • PERMISSIONS.md — auditable trust contract
  • Read-only — never writes configs, runs servers, or stores secrets
  • Sigstore signed — releases v0.7.0+ signed via cosign
  • Credential redaction — only env var names in reports

Roadmap

  • CIS AI benchmarks
  • Agent guardrails engine — runtime policy enforcement
  • EU AI Act compliance mapping
  • Multi-language SDK detection (Go, Rust, Java)
  • Workflow engine scanning (n8n, Zapier, Make)
  • License compliance engine

Contributing

git clone https://github.com/msaad00/agent-bom.git && cd agent-bom
pip install -e ".[dev]"
pytest && ruff check src/

See CONTRIBUTING.md | SECURITY.md | Skills


Apache 2.0 — LICENSE

Reviews

No reviews yet

Sign in to write a review