DriftCop.
The ultrafast-fast security cop keeping your MCP servers locked-in and locked-down.
Drift-Cop is your Enterprise grade MCP security scanner based CLI + live dashboard that spots dangerous drift in AI tools. It spots injection hacks, and CVEs, signs every change in SigStore. Drift-Cop is designed to help AI developers and InfoSec organizations identify, track, and mitigate security vulnerabilities in MCP server implementations they use from external untrusted sources.
- Spot the Drift instantly – Diff every manifest, dependency and workspace change against golden baselines in real-time.
- Attack-aware Scanning – Rug-pull, typosquat, supply-chain & prompt-injection rules baked-in and update daily.
- Actionable Autopilot – AI-generated fixes, PR suggestions and Slack/SIEM alerts 🚨.
- Two-Piece Powerhouse – Lightweight CLI + Cloud Control-Plane give you end-to-end coverage without vendor lock-in.
“We caught an auth-bypass typo before it hit production. Drift-Cop paid for itself on day one.” – A Very Happy DevOps Lead
Drift-Cop is a defensive security platform designed to help developers and organizations identify, track, and mitigate security vulnerabilities in MCP server implementations. It consists of two main components working seamlessly together to provide end-to-end security coverage.
A powerful command-line security scanner that performs deep analysis of MCP servers, codebases, and dependencies.
Key Features:
- Multi-Layer Scanning: Comprehensive analysis of server manifests, workspace code, and dependencies
- Advanced Threat Detection:
- Typosquatting detection using Levenshtein distance and TF-IDF similarity
- Semantic drift analysis powered by LLM to detect mismatches between descriptions and capabilities
- Prompt injection pattern detection including hidden characters and system manipulation
- Known CVE scanning in dependencies
- Cryptographic Security:
- SHA-256 based tool hashing with canonical JSON representation
- Sigstore integration for digital signatures (DSSE envelope format)
- Version tracking to detect unauthorized changes
- Lock file management for manifest pinning
- Language Support: Extracts MCP tool definitions from 10+ languages using Tree-sitter AST parsing
- Flexible Reporting: Markdown, JSON, and SARIF formats for CI/CD integration
A modern React-based dashboard providing real-time visualization and management of security findings.
Key Features:
- Real-Time Dashboard: Live monitoring of configuration drifts and security issues
- Interactive Approval Workflows:
- Quick approve for low-risk changes
- Detailed review process for high-risk modifications
- Complete audit trail with timestamps and approver tracking
- Advanced Filtering & Search: Filter by severity, environment, repository, or custom search
- Bulk Operations: Select and approve multiple drifts simultaneously
- Data Export: CSV and JSON export for reporting and analysis
- Zero-Integration Design: Works with existing MCP-SEC installations without code modifications
- Scan an MCP Server:
- Start the Web UI:
- Access the Dashboard:
- Web UI: http://localhost:5173
- API Docs: http://localhost:8000/docs
- Typosquatting: Detects lookalike server names (e.g., fiIesystem vs filesystem)
- Semantic Drift: Identifies tools whose capabilities don't match their descriptions
- Permission Analysis: Flags excessive or dangerous permissions
- Prompt Injection: Detects hidden instructions and malicious patterns
- Supply Chain: Scans for known CVEs and unpinned dependencies
Findings are categorized by severity:
- Critical (10.0): Immediate security risk requiring urgent action
- High (7.0): Serious security concern
- Medium (4.0): Moderate risk
- Low (1.0): Minor issue
- Info (0.0): Informational finding
- Detection: Scanner identifies configuration changes
- Notification: Changes tracked in SQLite database
- Review: Security team reviews via web dashboard
- Approval: Approved changes are applied, rejected ones blocked
- Audit: Complete trail maintained for compliance
- Pin Dependencies: Use exact versions in lock files
- Sign Manifests: Use Sigstore for cryptographic signatures
- Minimize Permissions: Request only necessary capabilities
- Clear Descriptions: Ensure tool descriptions match functionality
- Regular Scans: Integrate security scanning in CI/CD
- Regular Monitoring: Use web dashboard for continuous oversight
- Risk Thresholds: Set appropriate thresholds for your environment
- Approval Workflows: Establish clear approval processes
- Audit Trails: Maintain records for compliance
- Incident Response: Have plans for high-severity findings
- MCP-SEC CLI Reference
- Web UI Guide
- Integration Guide
- API Documentation (when running)
We welcome contributions! Please see our contributing guidelines for:
- Code style and standards
- Testing requirements
- Pull request process
- Security disclosure policy
DriftCop is released under an open-core licensing model:
- Core Components (/mcp-sec, /mcp-sec-web): Apache License 2.0
- Community Rules (/rules/community): CC0 1.0 (Public Domain)
- Enterprise Features (/enterprise, /cloud, /rules/pro): Business Source License 1.1
- Documentation (/docs, /logos): CC BY 4.0
See LICENSE.txt for full details.
By submitting contributions, you agree to our Contributor License Agreement.
- Built for the Model Context Protocol community
- Powered by Tree-sitter for robust code parsing
- Uses Sigstore for supply chain security
- Inspired by best practices from OWASP and security research
Security Notice: This tool is designed for defensive security purposes only. It helps developers and security teams identify and prevent vulnerabilities in MCP implementations. Always use responsibly and in accordance with applicable laws and regulations.
.png)
