npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

shieldnet-mcp

v1.0.1

Published

ShieldNet Security Scanner — MCP Server for AI Agent Security Governance. Scans URLs for XSS, SQLi, SSTI, CORS misconfig, missing headers, info disclosure, and more. Returns ALLOW/WARN/BLOCK governance decisions.

Downloads

191

Readme

🛡️ ShieldNet MCP — Security Scanner for AI Agents

Bring security governance to any AI agent deployment via MCP.

Track: Secure & Govern MCP | MCP_HACK//26

npm License: MIT tests Node ≥ 18 MCP Server


What It Does

ShieldNet MCP is a zero-trust guardrail for AI agents. Before your agent connects to any external endpoint (API, webhook, third-party service), ShieldNet scans it and returns an ALLOW / WARN / BLOCK decision — with full findings and severity ratings.

  • Scan URLs for 50+ checks across 7 security modules
  • Governance decisions — auto-gate agent connections with ALLOW/WARN/BLOCK
  • Security headers audit — quick compliance check
  • Side-by-side comparisons — which endpoint is safer?
  • Session history — track all scans with grades and scores
  • Pre-built prompts — security audit & pre-deployment check workflows

Why It Matters

AI agents increasingly interact with external APIs and services. Without security governance:

  • An agent could connect to a compromised endpoint
  • Sensitive data could leak through misconfigured CORS
  • Injection attacks could manipulate agent behavior

ShieldNet acts as a security guardrail — scan first, connect later.

Architecture

┌──────────┐       ┌───────────────────────┐
│          │       │    agentgateway       │
│  AI Agent│──────▶│  ┌─────────────────┐  │      ┌────────═══════┐
│ (Claude, │       │  │  🔗 ShieldNet   │  │      │  External     │
│  GPT,    │◀──────│  │  MCP Server     │──┼─────▶│  Service      │
│  etc.)   │       │  │                 │  │      │  (target URL) │
│          │       │  │  ┌───────────┐  │  │      │               │
└──────────┘       │  │  │ Scanners  │  │  │      └───────────────┘
                   │  └──┼───────────┼──┘  │
                   │     │              │  │
                   │  ┌──▼──┐ ┌───────▼──┐ │
                   │  │Headers│ │Injection │ │
                   │  │ TLS  │ │Info Disc │ │
                   │  │ Auth │ │Misconfig  │ │
                   │  │Rate  │ │          │ │
                   │  │Limit │ │          │ │
                   │  └──────┘ └──────────┘ │
                   │  ALLOW / WARN / BLOCK  │
                   └────────────────────────┘

Flow:

  1. AI agent requests external connection
  2. agentgateway routes to ShieldNet MCP
  3. ShieldNet runs 7 scanner modules in parallel
  4. Returns ALLOW/WARN/BLOCK + detailed findings
  5. agentgateway enforces the decision

Scanner Modules (7)

| # | Module | What It Checks | |---|--------|----------------| | 1 | security_headers | HSTS, CSP, X-Frame-Options, Cookie flags, CORS wildcards, info disclosure | | 2 | injection | Reflected XSS, SQLi, SSTI, Command Injection, Path Traversal, SSRF, Open Redirect | | 3 | info_disclosure | 25 sensitive paths (.env, .git, package.json, swagger, backups, server-status) | | 4 | tls | HTTP vs HTTPS, SSL/TLS redirect enforcement | | 5 | auth | JWT exposure, JWT alg:none, API keys in source, email harvesting | | 6 | misconfiguration | CORS origin reflection, TRACE method, version disclosure in error pages | | 7 | rate_limiting | 20-request burst test (aggressive mode only) |

Quick Start

1. Install

git clone https://github.com/hhhashexe/shieldnet-mcp.git
cd shieldnet-mcp
npm install

2. Run a demo scan (no setup needed)

bash demo.sh https://example.com

This launches the MCP server, discovers available tools via tools/list, runs a live scan, and pretty-prints the results with colors. 🤙

3. Run the test suite

npm test

75 integration tests covering all 6 MCP tools, 6 tools + 3 resources + 2 prompts.

4. Use as an MCP Server

Claude Desktop

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "shieldnet": {
      "command": "node",
      "args": ["/path/to/shieldnet-mcp/src/index.js"]
    }
  }
}

With agentgateway

targets:
  - name: shieldnet-security
    provider:
      type: mcp
      config:
        command: node
        args: ["src/index.js"]

See agentgateway.yaml for full configuration.

Raw JSON-RPC (stdio)

echo '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2024-11-05","capabilities":{},"clientInfo":{"name":"my-agent","version":"0.1"}}}
{"jsonrpc":"2.0","method":"notifications/initialized"}
{"jsonrpc":"2.0","id":2,"method":"tools/call","params":{"name":"scan_url","arguments":{"url":"https://example.com"}}}' | node src/index.js

MCP Tools

| Tool | Description | |------|-------------| | scan_url | Comprehensive scan — 7 modules, 50+ checks, A-F grade | | assess_risk | Scan + governance decision (ALLOW/WARN/BLOCK) with confidence score | | check_headers | Quick security headers audit — PASS/WARN/FAIL verdict | | scan_history | Session scan history with grades | | compare_scans | Side-by-side comparison of two URLs | | governance_policy | View policy or evaluate a score against thresholds |

MCP Resources

| Resource | Description | |----------|-------------| | shieldnet://attack-vectors | Full attack vector database | | shieldnet://scan-history | Session scan history | | shieldnet://governance-policy | ALLOW/WARN/BLOCK thresholds |

MCP Prompts

| Prompt | Description | |--------|-------------| | security_audit | Full audit with executive report | | pre_deployment_check | Gate check before deployment |

Security Governance

ShieldNet makes ALLOW/WARN/BLOCK decisions based on:

ALLOW  → Score ≥ 70, no critical findings
WARN   → Score 50-69, or high-severity findings
BLOCK  → Score < 50, or any critical vulnerabilities

Real-World Proof

ShieldNet has been used in production security audits:

  • 3 CVEs discovered and responsibly disclosed
  • PayLock.xyz audit: 36 verified findings (4 Critical, 17 High)
  • Published on npm as shieldnet (v0.3.2)

License

MIT — see LICENSE

Links