npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

aiagentshield

v0.8.1

Published

Security scanner for AI Agents and MCP Servers — 10 scanners for prompt injection, supply chain poisoning, secret leaks, and misconfigs

Readme

AgentShield

npm version license tests

When your AI agent has tool access, prompt injection is RCE. AgentShield scans agent skill packages for supply chain poisoning, naming attacks, and configuration risks — before they reach production.

Scanners

🔗 Supply Chain Scanner

Detects skill supply chain poisoning:

| Rule | Threat | |------|--------| | SUPPLY-001 | Base64 hidden commands | | SUPPLY-002 | Remote code execution patterns | | SUPPLY-003 | IOC blocklist matching | | SUPPLY-004 | Credential theft | | SUPPLY-005 | Data exfiltration | | SUPPLY-006 | Persistence mechanisms |

🎭 Convention Squatting Scanner

Detects naming impostor attacks — packages that mimic trusted skill names via typosquatting, prefix hijacking, or namespace confusion.

🛡️ DXT Security Scanner

Scans for insecure Claude Desktop Extension (DXT) configurations. DXT extensions run unsandboxed with full system privileges — a malicious calendar invite or email can trigger arbitrary code execution (OWASP MCP01: Tool Poisoning / MCP02: Trust Boundary violations).

| Rule | Severity | Threat | |------|----------|--------| | DXT-001 | CRITICAL | Unsandboxed extension with external data source + local executor | | DXT-002 | HIGH | Unrestricted file system access | | DXT-003 | HIGH | Unrestricted network access | | DXT-004 | HIGH | Code execution permission enabled | | DXT-005 | HIGH | Extension running without sandboxing | | DXT-006 | HIGH | Unsigned/unverified extension | | DXT-007 | MEDIUM | Signed but unverified signature | | DXT-008 | MEDIUM | File system + network combo without sandbox | | DXT-009 | MEDIUM | External data source without sandbox | | DXT-010 | MEDIUM | Unrestricted executor |

🧹 Hygiene Auditor

Audits agent configuration hygiene — overly broad permissions, missing access controls, and risky defaults that expand an agent's attack surface.

Why AgentShield?

AI agents in 2026 operate with real tool access: file systems, APIs, databases, code execution. A single compromised skill package can escalate to full system access — no exploit chain required.

  • Supply chain is the new attack vector. Agents pull skills from registries. One poisoned package = game over.
  • Zero Trust for agent tooling. Every skill should be verified before it gets tool access.
  • Defense in depth works. Research on 300K adversarial prompts shows multi-layer scanning drops attack success from 7% to 0.003%.

AgentShield gives you that scanning layer — lightweight, pluggable, and CI/CD-ready.

Usage

# Scan a directory
npx aiagentshield ./path/to/agent

# With external IOC blocklist
npx aiagentshield ./path/to/agent ./custom-ioc-blocklist.json

IOC Blocklist

The built-in blocklist is at src/data/ioc-blocklist.json. You can provide an external JSON file with the same format to extend it.

Development

npm install
npm run build
npm test

Architecture

  • src/types.ts — Core type definitions (Scanner, Finding, ScanResult)
  • src/scanner-registry.ts — Scanner registration and orchestration
  • src/scanners/ — Individual scanner implementations
  • src/utils/ — Shared utilities (file walking, etc.)
  • src/data/ — Static data (IOC blocklists)

OWASP MCP Top 10 Coverage

Coverage mapping against the OWASP MCP Top 10 (v0.7.0):

| # | Risk | Status | Scanner(s) | |---|------|--------|------------| | MCP01 | Token Mismanagement & Secret Exposure | ✅ Covered | Secret Leak Scanner | | MCP02 | Privilege Escalation via Scope Creep | ✅ Covered | Permission Analyzer, Hygiene Auditor | | MCP03 | Tool Poisoning | ✅ Covered | Prompt Injection Tester (tool injection patterns), Skill Auditor | | MCP04 | Software Supply Chain Attacks | ✅ Covered | Supply Chain Scanner, Convention Squatting Scanner | | MCP05 | Command Injection & Execution | ✅ Covered | Supply Chain Scanner (RCE detection), Red Team Simulator | | MCP06 | Prompt Injection via Contextual Payloads | ✅ Covered | Prompt Injection Tester (140+ patterns) | | MCP07 | Insufficient Authentication & Authorization | 🟡 Partial | MCP Config Auditor, Agent Config Auditor (config-level checks; no runtime auth enforcement) | | MCP08 | Insecure Data Handling | 🟡 Partial | Defense Analyzer, Environment Isolation Auditor (data flow analysis; no encryption validation) | | MCP09 | Logging & Monitoring Gaps | 🟡 Partial | Agent Config Auditor, Hygiene Auditor (checks for missing logging config; no log completeness analysis) | | MCP10 | Server-Side Request Forgery (SSRF) | 🔲 Planned | — |

Legend: ✅ Covered — 🟡 Partial — 🔲 Planned

CI/CD Integration (GitHub Action)

AgentShield provides a GitHub Action to automatically scan agent configurations in your CI/CD pipeline.

Quick Start

# .github/workflows/agentshield.yml
name: AgentShield Security Scan

on: [push, pull_request]

jobs:
  scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: TakumaLee/AgentShield@main
        with:
          scan-path: '.'
          fail-on-critical: 'true'
          output-format: 'text'

Inputs

| Input | Description | Default | |-------|-------------|---------| | scan-path | Path to scan | . | | fail-on-critical | Fail workflow on critical findings | true | | output-format | Output format (text or json) | text |

Examples

Scan a specific directory with JSON output:

- uses: TakumaLee/AgentShield@main
  with:
    scan-path: './agents'
    output-format: 'json'

Warn on critical but don't fail:

- uses: TakumaLee/AgentShield@main
  with:
    fail-on-critical: 'false'

License

MIT