MCP Hub
Back to servers

GuardianShield

AI security layer: code scanning, PII detection, prompt injection, secrets, CVEs

Stars
1
Updated
Mar 1, 2026

Quick Install

uvx guardianshield

GuardianShield

PyPI version Python License Tests

Universal AI security layer — an open-source MCP server for code scanning, PII detection, prompt injection defense, secret detection, dependency auditing, and audit logging.

Zero dependencies · 16 MCP tools · 5 safety profiles · 75+ detection patterns

Features

  • Code Vulnerability Scanning — SQL injection, XSS, command injection, path traversal with CWE IDs and auto-fix remediation
  • Dependency Security — Version-aware CVE matching against OSV.dev for PyPI, npm, Go, and Packagist ecosystems
  • Manifest Parsing — Auto-detects 11 formats (requirements.txt, package.json, yarn.lock, go.mod, composer.json, and more)
  • Prompt Injection Defense — 9+ detection patterns for instruction override, role hijacking, ChatML injection
  • PII Detection — Email, SSN, credit card, phone, IP — with automatic redaction in findings
  • Secret Detection — AWS keys, GitHub tokens, Stripe keys, JWTs, passwords, connection strings
  • Safety Profiles — 5 built-in profiles (general, education, healthcare, finance, children)
  • Audit Logging — SQLite-backed scan history with finding retrieval and filtering

Install

pip install guardianshield

Quick Start

# Register with Claude Code
claude mcp add guardianshield -- guardianshield-mcp

# Or run directly
guardianshield-mcp

Editor Integration

# Claude Code
claude mcp add guardianshield -- guardianshield-mcp

# VS Code (.vscode/mcp.json)
{"servers": {"guardianshield": {"type": "stdio", "command": "guardianshield-mcp"}}}

# Cursor (.cursor/mcp.json)
{"mcpServers": {"guardianshield": {"command": "guardianshield-mcp"}}}

# Claude Desktop (claude_desktop_config.json)
{"mcpServers": {"guardianshield": {"command": "guardianshield-mcp"}}}

MCP Tools

Scanning

ToolDescription
scan_codeScan source code for vulnerabilities and hardcoded secrets
scan_fileScan a single file (auto-detects language from extension)
scan_directoryRecursively scan a directory with filtering and progress streaming
scan_inputCheck user/agent input for prompt injection attempts
scan_outputCheck AI output for PII leaks and content violations
check_secretsDetect hardcoded secrets and credentials

Dependency Security

ToolDescription
check_dependenciesCheck packages for known CVEs via OSV.dev (PyPI, npm, Go, Packagist)
sync_vulnerabilitiesSync the local OSV vulnerability database
parse_manifestParse any supported manifest file (11 formats) into dependency objects
scan_dependenciesScan a directory for manifest files and check all deps for vulnerabilities

Configuration & Utilities

ToolDescription
get_profileGet current safety profile configuration
set_profileSwitch safety profile (general, education, healthcare, finance, children)
test_patternTest a regex pattern against sample code for custom pattern development
audit_logQuery the security audit log
get_findingsRetrieve past findings with filters
shield_statusGet health, configuration, and OSV cache statistics

Configuration

Set environment variables to customize behavior:

VariableDescriptionDefault
GUARDIANSHIELD_PROFILEDefault safety profilegeneral
GUARDIANSHIELD_AUDIT_PATHPath to SQLite audit database~/.guardianshield/audit.db
GUARDIANSHIELD_DEBUGEnable debug logging (1)disabled

Documentation

Full documentation: sparkvibe-io.github.io/GuardianShield

License

Apache 2.0

Reviews

No reviews yet

Sign in to write a review