Security Rules Reference
Complete documentation of all 36 security rules in MCPSafe
MCPSafe scans MCP server source code for security vulnerabilities using a comprehensive set of detection rules. Each rule targets a specific vulnerability pattern and provides actionable remediation guidance.
Rule Categories
Security rules are organized into categories based on the type of vulnerability they detect.
Command Injection
Vulnerabilities allowing execution of arbitrary system commands
Code Injection
Vulnerabilities allowing execution of arbitrary code
Path Traversal
Vulnerabilities allowing access to files outside intended directories
Network Security
SSRF and other network-related vulnerabilities
Hardcoded Secrets
Credentials and API keys embedded in source code
Authentication
Weak authentication patterns and missing auth checks
SQL Injection
Vulnerabilities allowing SQL query manipulation
Information Disclosure
Exposure of sensitive data through logs or errors
Insecure Deserialization
Unsafe deserialization of untrusted data
Other
Additional security checks and validations
Severity Levels
Each vulnerability is assigned a severity level based on its potential impact and exploitability.
Immediate exploitation risk, requires urgent fix
Significant security impact, fix soon
Moderate risk, should be addressed
Minor issues, best practices
All Security Rules
Showing 36 of 36 rules
Command Injection
Code Injection
Path Traversal
Network Security
Hardcoded Secrets
Authentication
SQL Injection
Insecure Deserialization
Other
Information Disclosure
Using the Rules API
You can programmatically access all security rules through the MCPSafe API.
GET /api/v1/scanner/rules
Retrieve all available security rules
curl -X GET "https://api.mcpsafe.com/api/v1/scanner/rules"
# Response
{
"rules": [
{
"rule_id": "CMD001",
"title": "child_process.exec() with User Input",
"severity": "critical",
"category": "command_injection",
"cwe_id": "CWE-78",
"cvss_score": 9.8,
"file_patterns": ["*.js", "*.ts"]
},
...
],
"total": 36
}Ready to scan your MCP server?
Submit your server and get a comprehensive security analysis using all 36 rules.