npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@bryan-thompson/inspector-assessment

v1.43.2

Published

Enhanced MCP Inspector with comprehensive assessment capabilities for server validation

Downloads

3,241

Readme

MCP Inspector Assessment

npm version npm downloads

Comprehensive MCP server validation with 18 automated assessment modules (17 active + 1 deprecated). Test functionality, security, documentation, code quality, and policy compliance from the command line.

MCP Inspector Screenshot


Installation

# Install globally
npm install -g @bryan-thompson/inspector-assessment

# Or use directly with bunx (no installation)
bunx @bryan-thompson/inspector-assessment

Quick Start: Assess an MCP Server

Run a full assessment on any MCP server:

# Create a config file
cat > /tmp/config.json << 'EOF'
{
  "transport": "http",
  "url": "http://localhost:8000/mcp"
}
EOF

# Run full assessment
mcp-assess-full --server my-server --config /tmp/config.json

# Results saved to /tmp/inspector-full-assessment-my-server.json

For STDIO servers (local commands):

cat > /tmp/config.json << 'EOF'
{
  "command": "python3",
  "args": ["server.py"],
  "env": {}
}
EOF

mcp-assess-full --server my-server --config /tmp/config.json

CLI Commands

The inspector provides three CLI commands for different workflows:

| Command | Purpose | Use Case | | ---------------------- | ----------------------------- | ---------------------------- | | mcp-assess-full | Complete 18-module assessment | Full validation, CI/CD gates | | mcp-assess-security | Security-only testing | Quick vulnerability scan | | mcp-inspector-assess | Interactive web UI | Debugging, exploration |

Common Options

# Full assessment with all modules
mcp-assess-full --server <name> --config <path>

# Security-only (faster)
mcp-assess-security --server <name> --config <path>

# Skip slow modules for CI/CD
mcp-assess-full --server <name> --skip-modules temporal,security

# Run only specific modules
mcp-assess-full --server <name> --only-modules functionality,toolAnnotations

# Generate markdown report
mcp-assess-full --server <name> --format markdown --output report.md

# Pre-flight validation (quick check)
mcp-assess-full --server <name> --preflight

For complete CLI documentation, see CLI Assessment Guide.


Assessment Modules (19 Total: 16 Active + 3 Opt-In)

Active Modules (16)

| Module | Purpose | Key Features | | ------------------------ | ---------------------------- | --------------------------------------------------- | | Functionality | Tool execution validation | Multi-scenario testing, business logic detection | | Security | Vulnerability detection | Comprehensive attack patterns, zero false positives | | Error Handling | MCP protocol compliance | Error code validation, response quality | | Protocol Compliance | Protocol adherence | JSON-RPC 2.0, MCP message formats, conformance | | AUP Compliance | Policy violation detection | 14 AUP categories (A-N) | | Temporal | Rug pull detection | Behavior changes over invocations | | Tool Annotations | readOnlyHint/destructiveHint | Policy #17 compliance | | Prohibited Libraries | Dependency security | Blocked packages (Stripe, FFmpeg, etc.) | | Manifest Validation | MCPB manifest compliance | manifest.json schema validation | | Authentication | OAuth/auth evaluation | Auth pattern validation, deployment context | | Resources | Resource capability | Discovery, read success, errors | | Prompts | Prompt capability | Execution, multimodal support | | Cross-Capability | Chained vulnerabilities | Multi-tool attack patterns | | Developer Experience | Doc + usability assessment | Documentation quality, naming conventions | | Portability | Cross-platform compatibility | Platform-specific code detection | | External API Scanner | External service detection | API URLs, affiliation warnings |

v1.25.2+: Protocol Compliance is a unified module combining MCP Spec Compliance and Protocol Conformance. See CLI Guide for details.

Opt-In Modules (3)

| Module | Purpose | Requirement | | ---------------------------- | ------------------------------ | ------------------------------------------------------ | | Dependency Vulnerability | npm/yarn/pnpm audit scanning | --source flag (requires shell execution) | | File Modularization | Code organization quality | --source flag (source code analysis) | | MCP Conformance Testing | Official conformance scenarios | HTTP/SSE transport + @modelcontextprotocol/conformance |

For detailed module documentation, see Assessment Catalog.


Security Testing: Pure Behavior Detection

The inspector uses pure behavior-based detection for security assessment, analyzing tool responses to identify actual code execution vs safe data handling.

How It Works

# Run security assessment
mcp-assess-security --server my-server --config config.json

Detection Strategy:

  1. Reflection Detection: Identifies when tools safely echo malicious input as data

    • "Stored query: ../../../etc/passwd" → SAFE (reflection)
    • "Query results for: ..." → SAFE (search results)
  2. Execution Evidence: Detects actual code execution

    • Response contains "root:x:0:0" → VULNERABLE (file accessed)
    • Response contains "total 42 drwx" → VULNERABLE (directory listed)
  3. Category Classification: Distinguishes safe tool types

    • Search/retrieval tools return data, not code execution
    • CRUD operations create resources, not execute code

Supported Attack Patterns

  • Command Injection, SQL Injection, Path Traversal, XXE, NoSQL Injection
  • Calculator Injection, Code Execution (Python/JS)
  • Data Exfiltration, Token Theft, Permission Scope
  • Unicode Bypass, Nested Injection, Package Squatting
  • DoS/Resource Exhaustion, Insecure Deserialization
  • Configuration Drift, Tool Shadowing

See Security Patterns Catalog for complete pattern documentation.


Testbed Validation

The inspector is validated against purpose-built testbed servers with ground-truth labeled tools:

# Test against vulnerable-mcp testbed (10 vulnerable + 6 safe tools)
npm run assess -- --server vulnerable-mcp --config /tmp/vulnerable-mcp-config.json
# Results: 200 vulnerabilities detected, 0 false positives (100% precision)

# Test against hardened-mcp testbed (same tool names, safe implementations)
npm run assess -- --server hardened-mcp --config /tmp/hardened-mcp-config.json
# Results: 0 vulnerabilities (proves behavior-based detection, not name-based)

Key Insight: Both servers have tools named vulnerable_calculator_tool, vulnerable_system_exec_tool, etc. The inspector detects 200 vulnerabilities on one server and 0 on the other - proving pure behavior-based detection, not name-based heuristics.

See Testbed Setup Guide for detailed validation results.


Assessment Output

JSON Results

Every assessment saves results to JSON:

# Default location
/tmp/inspector-full-assessment-<server-name>.json

# Custom output
mcp-assess-full --server my-server --output ./results.json

Quick Analysis:

# View overall status
cat /tmp/inspector-full-assessment-my-server.json | jq '.overallStatus'

# List security vulnerabilities
cat /tmp/inspector-full-assessment-my-server.json | jq '.modules.security.vulnerabilities'

# Check broken tools
cat /tmp/inspector-full-assessment-my-server.json | jq '.modules.functionality.brokenTools'

# Get module scores
cat /tmp/inspector-full-assessment-my-server.json | jq '.moduleSummary'

Exit Codes

mcp-assess-full --server my-server
echo $?
# 0 = PASS (all modules passed)
# 1 = FAIL (vulnerabilities or failures found)

Quality Metrics

  • Test Coverage: ~1560 tests passing across 66 test suites
  • Assessment Module Tests: 291+ tests validating assessment enhancements
  • Code Quality: Production TypeScript types, proper error handling
  • Upstream Sync: Up-to-date with v0.18.0

Run tests:

npm test                         # All ~1560 tests
npm test -- assessment           # Assessment module tests
npm test -- SecurityAssessor     # Security tests

Documentation

Quick Start

| Document | Purpose | | ------------------------------------------------------ | ------------------------------ | | CLI Assessment Guide | Complete CLI modes and options | | Architecture & Value | What this provides and why |

API & Integration

| Document | Purpose | | -------------------------------------------------------- | ---------------------------- | | Programmatic API Guide | AssessmentOrchestrator usage | | API Reference | Complete API documentation | | Integration Guide | CI/CD, multi-server patterns |

Assessment Details

| Document | Purpose | | -------------------------------------------------------------- | ------------------------------------ | | Assessment Catalog | Complete assessment module reference | | Security Patterns Catalog | Comprehensive attack patterns | | Testbed Setup Guide | A/B validation |

Advanced Topics

| Document | Purpose | | -------------------------------------------------------------------- | --------------------------------- | | Architecture Detection Guide | Server infrastructure analysis | | Behavior Inference Guide | Tool behavior classification | | Performance Tuning Guide | Assessment execution optimization |

For complete documentation, see docs/README.md.


Evidence & Validation

All performance claims are backed by implementation analysis.

| Claim | Evidence | | --------------------------------- | --------------------------------------------------------------------------------- | | Progressive complexity (2 levels) | TestScenarioEngine.ts | | Comprehensive security patterns | securityPatterns.ts | | Zero false positives | SecurityAssessor.ts |


Contributing

We welcome contributions! See PROJECT_STATUS.md for current development status.

Areas of interest:

  • Additional security patterns
  • Performance optimizations
  • CI/CD integration examples
  • New assessment modules

Repository: https://github.com/triepod-ai/inspector-assessment


Links

  • npm Package: https://www.npmjs.com/package/@bryan-thompson/inspector-assessment
  • GitHub Repository: https://github.com/triepod-ai/inspector-assessment
  • Issues: https://github.com/triepod-ai/inspector-assessment/issues
  • MCP Documentation: https://modelcontextprotocol.io
  • Changelog: CHANGELOG.md

License

This project is licensed under the MIT License—see the LICENSE file for details.


Appendix: Fork History & Acknowledgments

This is an enhanced fork of Anthropic's MCP Inspector with significantly expanded assessment capabilities.

| Repository | URL | | ------------- | -------------------------------------------------- | | Original | https://github.com/modelcontextprotocol/inspector | | This Fork | https://github.com/triepod-ai/inspector-assessment |

Note: If you want the official Anthropic inspector without assessment features, use:

npx @modelcontextprotocol/inspector

What We Added

We built a comprehensive assessment framework on top of the original inspector, transforming it from a debugging tool into a full validation suite. Key additions:

18 Assessment Modules covering functionality, security, compliance (16 active + 2 opt-in)

  • Pure Behavior-Based Detection analyzing responses, not tool names
  • Zero False Positives through context-aware reflection detection
  • CLI-First Workflow with three specialized commands

Base Inspector Features

For documentation on the underlying inspector UI and operational features (Docker, authentication, configuration, transports), see:

Acknowledgments

This project builds upon the excellent foundation provided by Anthropic's MCP Inspector team. We're grateful for their work on the original inspector and the MCP protocol specification.