DocumentationScannerSecurity Rules

Security Rules Reference

Complete documentation of all 36 security rules in MCPSafe

MCPSafe scans MCP server source code for security vulnerabilities using a comprehensive set of detection rules. Each rule targets a specific vulnerability pattern and provides actionable remediation guidance.

36
Total Rules
10
Critical Rules
15
High Rules
10
Categories

Rule Categories

Security rules are organized into categories based on the type of vulnerability they detect.

Command Injection

4

Vulnerabilities allowing execution of arbitrary system commands

Code Injection

6

Vulnerabilities allowing execution of arbitrary code

Path Traversal

4

Vulnerabilities allowing access to files outside intended directories

Network Security

5

SSRF and other network-related vulnerabilities

Hardcoded Secrets

2

Credentials and API keys embedded in source code

Authentication

3

Weak authentication patterns and missing auth checks

SQL Injection

2

Vulnerabilities allowing SQL query manipulation

Information Disclosure

2

Exposure of sensitive data through logs or errors

Insecure Deserialization

3

Unsafe deserialization of untrusted data

Other

5

Additional security checks and validations

Severity Levels

Each vulnerability is assigned a severity level based on its potential impact and exploitability.

Critical
10

Immediate exploitation risk, requires urgent fix

High
15

Significant security impact, fix soon

Medium
11

Moderate risk, should be addressed

Low
0

Minor issues, best practices

All Security Rules

Showing 36 of 36 rules

Command Injection

4

Code Injection

6

Path Traversal

4

Network Security

5

Hardcoded Secrets

2

Authentication

3

SQL Injection

2

Insecure Deserialization

3

Other

5

Information Disclosure

2

Using the Rules API

You can programmatically access all security rules through the MCPSafe API.

GET /api/v1/scanner/rules

Retrieve all available security rules

curl -X GET "https://api.mcpsafe.com/api/v1/scanner/rules"

# Response
{
  "rules": [
    {
      "rule_id": "CMD001",
      "title": "child_process.exec() with User Input",
      "severity": "critical",
      "category": "command_injection",
      "cwe_id": "CWE-78",
      "cvss_score": 9.8,
      "file_patterns": ["*.js", "*.ts"]
    },
    ...
  ],
  "total": 36
}

Ready to scan your MCP server?

Submit your server and get a comprehensive security analysis using all 36 rules.