Usage
Options
| Option | Default | Description |
|---|---|---|
--config | auto-discovered | Path to .langsight.yaml |
--json | false | Output as JSON |
--ci | false | Exit code 1 on CRITICAL or HIGH findings |
What it checks
CVE Scanning
Readspyproject.toml or package.json from each server’s directory and queries the OSV API for known vulnerabilities. No API key required.
OWASP MCP Top 10
| Check | Category | Severity |
|---|---|---|
| No authentication configured | OWASP-MCP-01 | CRITICAL (SSE) / MEDIUM (stdio) |
| Destructive tools without auth | OWASP-MCP-02 | HIGH |
| Unexpected schema change | OWASP-MCP-04 | HIGH |
| Tools with no input schema | OWASP-MCP-05 | MEDIUM |
| HTTP transport (no TLS) | OWASP-MCP-06 | HIGH |
Tool Poisoning Detection
Scans tool names and descriptions for:- Prompt injection phrases (
ignore previous instructions) - Data exfiltration patterns (
send all data to) - External URLs in descriptions
- Hidden unicode characters
- Base64-encoded injection payloads