npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@eigenart/agentshield-mcp

v0.1.6

Published

MCP server for AgentShield — detect prompt injection, jailbreak, and social-engineering attempts in any text before your agent processes it.

Readme

@eigenart/agentshield-mcp

Official MCP (Model Context Protocol) server for AgentShield — the runtime gateway and real-time classifier that detects prompt-injection, jailbreak, and social-engineering attempts in text while your agent is running, not in an offline audit pass.

Works with any MCP-compatible client: Claude Desktop, Cursor, Cline, Zed, Continue, and custom agents. Single-shot per request, p50 ~2.4 ms — designed to sit in the agent's hot path on every untrusted input.

What it does

Exposes one tool to the agent: classify_text. Call it on any untrusted text (user messages, retrieved documents, web scrapes, third-party tool outputs) and get back a per-request verdict.

{
  "is_injection": true,
  "confidence": 0.94,
  "category": "jailbreak",
  "latency_ms": 2.4,
  "model": "agentshield-minilm-v2",
  "request_id": "req_01HX…"
}

Classifier is hosted at api.agentshield.pro. No local GPU, no model download. Free tier: 100 classifications/day, no credit card.

Install (Claude Desktop)

Add to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):

{
  "mcpServers": {
    "agentshield": {
      "command": "npx",
      "args": ["-y", "@eigenart/agentshield-mcp"],
      "env": {
        "AGENTSHIELD_API_KEY": "ask_your_key_here"
      }
    }
  }
}

Restart Claude Desktop. The classify_text tool will be available.

Install (Cursor / Cline / Zed / Continue)

Same pattern — each client has its own MCP config path, but the command + env block are identical to the Claude Desktop snippet above. See your client's MCP docs for the exact file.

Get an API key

Free tier, no credit card: agentshield.pro/signup.

Usage pattern (for your agent)

The tool description already tells the agent when to use this, but the core rule is:

Before your agent processes any external/untrusted text, call classify_text. If is_injection=true and confidence ≥ 0.8, refuse to act and escalate.

Typical sources of untrusted text:

  • User messages from public channels
  • RAG / retrieved documents / web scrapes
  • Tool-call results from third-party services
  • Filenames, issue titles, commit messages from external contributors

Environment variables

| Variable | Required | Default | Purpose | |---|---|---|---| | AGENTSHIELD_API_KEY | yes | — | Your API key from agentshield.pro | | AGENTSHIELD_BASE_URL | no | https://api.agentshield.pro | Override for self-hosted gateway |

Benchmark

Public, reproducible: agentshield.pro/benchmark

  • F1: 0.956 (headline, 5 of 6 public datasets, 4,666 samples; jackhhao role-play set analyzed separately) / 0.921 (full set, all 6 datasets, 5,972 samples) (EN/DE/ES/ZH/FR + encoding-obfuscation)
  • Latency: p50 2.44 ms (gateway + GPU classifier)
  • Dataset and scoring script are open source.

Roadmap

  • v0.2check_output tool (output-side secret/PII leak detection, layer 3 of the Gateway)
  • v0.2get_usage tool (rate-limit status for the current API key, so the agent can self-manage budget)
  • v0.3 — streaming / batch classification
  • v0.3 — local-first mode (ship a distilled classifier in the package, zero network)

File issues at github.com/dl-eigenart/agentshield-platform/issues.

Related

  • Python SDK — pip install agentshield-sdk (import stays from agentshield import AgentShield)
  • ElizaOS plugin (Solana transaction guard) — @eigenart/agentshield
  • Full product & pricing — agentshield.pro

Not an audit tool

AgentShield is a runtime classifier for live agent traffic. If you are looking for a one-shot pre-deployment OWASP-LLM-Top-10 scan of your own prompts, that is a different product category — use a static audit tool for that and pair it with AgentShield at runtime.

License

MIT © Eigenart Filmproduktion. See LICENSE.