msaad00

agent-bom

Community msaad00
Updated

Open-source AI supply chain security scanner. Discover agents, MCP servers, GPU workloads. Scan for CVEs. Map blast radius to credentials and tools. CIS benchmarks (AWS, Snowflake). 10-framework compliance. Policy-as-code. REST API, MCP server, CLI, Helm.

Open-source security scanner for AI agent infrastructure.Discover configurations, scan dependencies, map blast radius, enforce compliance.

Get started

pip install agent-bom

agent-bom scan                                     # auto-discover + scan
agent-bom scan --enrich                            # + NVD CVSS + EPSS + CISA KEV
agent-bom scan -f html -o report.html              # HTML dashboard
agent-bom scan --enforce                           # tool poisoning detection
agent-bom scan --fail-on-severity high -q          # CI gate
agent-bom scan --image myapp:latest                # Docker image scanning
agent-bom scan --k8s --all-namespaces              # K8s cluster
agent-bom scan --aws --snowflake --databricks      # Multi-cloud
agent-bom scan --aws-cis-benchmark                 # CIS AWS Foundations v3.0
agent-bom scan --snowflake-cis-benchmark           # CIS Snowflake v1.0
agent-bom scan --hf-model meta-llama/Llama-3.1-8B  # model provenance

Auto-discovers Claude Desktop, Claude Code, Cursor, Windsurf, Cline, VS Code Copilot, Continue, Zed, Cortex Code (CoCo), Codex CLI, Gemini CLI, Goose, Snowflake CLI, OpenClaw, Roo Code, Amazon Q, ToolHive, Docker MCP, JetBrains AI, and Junie.

Install extras
Mode Command
Core CLI pip install agent-bom
Cloud (all) pip install 'agent-bom[cloud]'
AWS pip install 'agent-bom[aws]'
Snowflake pip install 'agent-bom[snowflake]'
Databricks pip install 'agent-bom[databricks]'
Nebius GPU cloud pip install 'agent-bom[nebius]'
REST API pip install 'agent-bom[api]'
Dashboard pip install 'agent-bom[ui]'
AI enrichment pip install 'agent-bom[ai-enrich]'
MCP server pip install 'agent-bom[mcp-server]'
OpenTelemetry pip install 'agent-bom[otel]'
Docker docker run --rm -v ~/.config:/root/.config:ro agentbom/agent-bom scan

Architecture

Why agent-bom

Traditional scanners tell you a package has a CVE. agent-bom tells you which AI agents are compromised, which credentials leak, which tools an attacker reaches, and gives you a fix-first priority across your entire AI stack.

What sets it apart: AI agent discovery (20 clients), blast radius mapping (CVE → agent → creds → tools), CIS benchmarks (AWS, Snowflake), 10-framework compliance, and policy-as-code — all open source.

How a CVE propagates through your AI stack

CVE-2025-1234  (CRITICAL · CVSS 9.8 · CISA KEV)
  └─ [email protected]  (npm)
       └─ sqlite-mcp  (MCP Server · unverified · 🛡 root)
            ├─ Cursor IDE  (Agent · 4 servers · 12 tools)
            ├─ ANTHROPIC_KEY, DB_URL, AWS_SECRET  (Credentials exposed)
            └─ query_db, read_file, write_file, run_shell  (Tools at risk)

 Fix: upgrade better-sqlite3 → 11.7.0

Scan pipeline

  1. Discover — auto-detect MCP configs across 20 clients (Claude Desktop, Cursor, JetBrains AI, Junie, Codex CLI, Gemini CLI, Goose, etc.)
  2. Extract — pull server names, package names, env var names, and tool lists. Credential values are never read.
  3. Scan — send only package names + versions to public APIs (OSV.dev, NVD, EPSS, CISA KEV). NVD status tracking (Analyzed/Modified/Rejected) with remediation links.
  4. Analyze — CVE blast radius mapping, per-CVE compliance tagging across 10 frameworks, tool poisoning detection (--enforce), model provenance
  5. Score — posture scorecard (grade A–F), credential risk ranking, incident correlation by agent (P1–P4)
  6. Report — JSON, SARIF, CycloneDX, SPDX, HTML, or console output. Alert dispatch to Slack/webhooks. Nothing stored server-side.

Individual developers: Steps 1–4 are automatic. Enterprise features (steps 5–6) activate with --enrich, --posture, or the REST API.

How to deploy

Use case Deploy Command
Quick local scan CLI agent-bom scan
CI/CD gate GitHub Action uses: msaad00/[email protected]
Security dashboard API + UI agent-bom serve
MCP tool integration MCP server agent-bom mcp-server (18 tools)
K8s fleet scanning Helm helm install deploy/helm/agent-bom
Analytics + viz Docker Compose cd infra/clickhouse && docker compose up
Snowflake governance API agent-bom api --snowflake
Isolated scan Docker docker run agentbom/agent-bom scan

Enterprise scan workflow

Trust guarantees: Read-only (no file writes, no config changes, no servers started). --dry-run previews all files and API calls then exits. Every release is Sigstore-signed. Run agent-bom verify agent-bom to check integrity. See PERMISSIONS.md for the full auditable trust contract.

Architecture data flow (Mermaid)
graph TB
    subgraph Input["Input Sources"]
        MCP["MCP Configs\n20 Clients"]
        Docker["Docker Images"]
        K8s["Kubernetes"]
        Cloud["Cloud APIs\nAWS / Azure / GCP / Snowflake"]
        SBOM["Existing SBOMs\nCycloneDX / SPDX"]
        AI["AI Platforms\nHuggingFace / W&B / MLflow"]
    end

    subgraph Core["Core Engine"]
        Discovery["Discovery Engine"]
        Parser["Package Parser"]
        Scanner["Vulnerability Scanner\nOSV + NVD + EPSS + KEV"]
        Blast["Blast Radius Analyzer"]
        Compliance["Compliance Tagger\n10 Frameworks"]
        Posture["Posture Scorer"]
    end

    subgraph Output["Output Channels"]
        Console["Console / HTML"]
        SBOM_Out["CycloneDX / SPDX / SARIF"]
        API["REST API + MCP Server"]
        Alerts["Slack / Webhook / Jira"]
    end

    MCP --> Discovery
    Docker --> Discovery
    K8s --> Discovery
    Cloud --> Discovery
    SBOM --> Discovery
    AI --> Discovery

    Discovery --> Parser
    Parser --> Scanner
    Scanner --> Blast
    Blast --> Compliance
    Compliance --> Posture

    Posture --> Console
    Posture --> SBOM_Out
    Posture --> API
    Posture --> Alerts

See docs/ARCHITECTURE.md for the full set of architecture diagrams including data flow pipeline, blast radius propagation, compliance framework mapping, and integration architecture.

Full feature comparison vs Grype / Syft / Trivy
Grype / Syft / Trivy agent-bom
Package CVE detection Yes Yes — OSV + NVD CVSS v4 + EPSS + CISA KEV + GHSA + NVIDIA CSAF + NVD status tracking
SBOM generation Yes (Syft) Yes — CycloneDX 1.6, SPDX 3.0, SARIF
AI agent discovery 20 MCP clients + Docker Compose auto-discovered
Blast radius mapping CVE → package → server → agent → credentials → tools
Credential exposure Which secrets leak per vulnerability, per agent
MCP tool reachability Which tools an attacker reaches post-exploit
Privilege detection runs_as_root, shell_access, container_privileged, per-tool permissions
Enterprise remediation Named assets, impact percentages, risk narratives
10-framework compliance OWASP Agentic + OWASP LLM + OWASP MCP + MITRE ATLAS + NIST AI RMF + EU AI Act + NIST CSF 2.0 + ISO 27001 + SOC 2 + CIS Controls v8
CVE-level compliance tags Per-vulnerability framework mapping (severity, KEV, EPSS, CWE, AI package, fix availability)
SAST code scanning Semgrep wrapper with CWE-based compliance mapping across all 10 frameworks
Malicious package detection OSV MAL- prefix + typosquat heuristics (57 popular packages)
OpenSSF Scorecard enrichment Package health scores from api.securityscorecards.dev
Tool poisoning detection Description injection, capability combos, CVE exposure, drift
Model weight provenance SHA-256 hash, Sigstore file detection, HuggingFace metadata
Policy-as-code Block unverified servers, enforce thresholds in CI/CD, EPSS/scorecard conditions
Posture scorecard Letter grade (A–F), 6-dimension scoring, weighted enterprise posture
Incident correlation Group vulns by agent, P1–P4 priority, SOC-ready incident summaries
Credential risk ranking Rank exposed credentials by blast radius severity tier
AI framework recognition GPU/ML packages flagged as high-risk in image scans (via Grype/Syft)
Lateral movement analysis Agent context graph, shared server/credential detection, BFS attack paths
CIS Benchmarks AWS Foundations v3.0 (18 checks), Snowflake v1.0 (12 checks)
427+ server MCP registry Risk levels, tool inventories, auto-synced weekly

What it scans

Input sources:

Source How
MCP configs Auto-discover (20 clients + Docker Compose)
Docker images Grype / Syft / Docker CLI fallback
Kubernetes kubectl across namespaces
Cloud providers AWS, Azure, GCP, Databricks, Snowflake, Nebius, CoreWeave
CIS benchmarks AWS Foundations v3.0, Snowflake v1.0
Terraform / GitHub Actions AI resources + env vars
AI platforms HuggingFace, W&B, MLflow, OpenAI
Jupyter notebooks AI library imports + model refs
Model files 13 formats (.gguf, .safetensors, .pkl, ...)
Skill files CLAUDE.md, .cursorrules, AGENTS.md
Prompt templates .prompt, .promptfile, prompt.yaml
Ollama models Local inventory via API + manifests
Source code (SAST) Semgrep wrapper with CWE mapping
Existing SBOMs CycloneDX / SPDX import

Output formats:

Console, HTML dashboard, SARIF, CycloneDX 1.6, SPDX 3.0, Prometheus, OTLP, JSON, REST API

Read-only guarantee: Never writes configs, never runs servers, never stores secrets. All API calls are read-only. See PERMISSIONS.md.

Ecosystem:

Platform Link
PyPI pip install agent-bom
Docker docker run agentbom/agent-bom scan
GitHub Action uses: msaad00/[email protected]
MCP Registry server.json
ToolHive registry entry
OpenClaw SKILL.md
Smithery smithery.yaml
Railway Dockerfile.sse
Helm deploy/helm/agent-bom/

For individual developers

Auto-discover your MCP configs, scan for CVEs, understand blast radius, and fix what matters. No compliance paperwork needed.

CVE scanning + blast radius

Every vulnerability is mapped through your AI stack: which agents are affected, which credentials are exposed, which MCP tools an attacker can reach, and what to fix first.

Enrichment sources: OSV batch (primary), NVD CVSS v4 + status tracking (Analyzed/Modified/Rejected), FIRST EPSS exploit probability, CISA KEV active exploitation catalog, GHSA, NVIDIA CSAF. Each CVE includes remediation source links from NVD references.

Guided remediation

Each fix tells you exactly what will be protected — named agents, credentials, tools, impact percentages, and risk narratives. Fixed versions are identified automatically.

Privilege detection

Every MCP server is assessed for privilege escalation risk:

Signal Detection
runs_as_root sudo in command/args, Docker Config.User empty/"0"/"root"
shell_access bash/sh/zsh/powershell command, exec/shell tools
container_privileged Docker HostConfig.Privileged, CapAdd/CapDrop
tool_permissions Per-tool read/write/execute/destructive classification

Privilege levels: critical (privileged container, CAP_SYS_ADMIN) → high (root, shell) → medium (fs write, network) → low (read-only).

MCP runtime introspection

Connect to live servers to discover runtime tools/resources and detect drift from configs. Read-only — only calls tools/list and resources/list.

agent-bom scan --introspect

Tool poisoning detection

Static analysis of MCP tool descriptions for prompt injection patterns, dangerous capability combinations (EXECUTE + WRITE), CVE exposure in server dependencies, and tool drift detection via introspection.

agent-bom scan --enforce                       # tool poisoning + enforcement checks
agent-bom scan --enforce --introspect          # + drift detection against live servers

Malicious package detection

OSV MAL- prefix flagging + typosquat heuristics against 57 popular AI/ML packages. Catches known-malicious npm/PyPI packages before they enter your MCP stack.

Skill file + prompt scanning

Scan CLAUDE.md, .cursorrules, AGENTS.md for embedded MCP servers, packages, and credentials. 7 security checks: typosquat detection, shell access, dangerous server names, unverified servers, excessive credentials, external URLs, unknown packages.

agent-bom scan --skill CLAUDE.md    # explicit
agent-bom scan --scan-prompts       # prompt template security
Model weight provenance

SHA-256 hash verification, Sigstore signature file detection, and HuggingFace model metadata (author, license, model card, gated status, download count).

agent-bom scan --hf-model meta-llama/Llama-3.1-8B          # HuggingFace provenance
agent-bom scan --model-files ./models --model-provenance   # hash + signature checks
Docker image + Jupyter notebook scanning

3-tier container scanning (Grype → Syft → Docker CLI fallback). Detect 29+ AI libraries, pip installs, credentials in notebooks. Scan 13 model file formats.

agent-bom scan --image myapp:latest        # Docker image scanning
agent-bom scan --jupyter ./notebooks       # notebook audit
agent-bom scan --model-files ./models      # model file scanning

That's all you need. Run agent-bom scan and you're done.Everything below is for teams deploying agent-bom as an enterprise security platform.

For enterprise teams

Compliance mapping, SBOM export, policy-as-code, posture scoring, CI/CD gates, cloud discovery, and fleet management.

10-framework compliance mapping

Every finding is tagged against ten frameworks simultaneously — both at the blast radius level (deployment context) and at the individual CVE level (severity, KEV, EPSS, CWE, AI package, fix availability):

Category Frameworks
AI-specific OWASP Agentic Top 10, OWASP LLM Top 10, OWASP MCP Top 10, MITRE ATLAS, NIST AI RMF 1.0, EU AI Act
Enterprise GRC NIST CSF 2.0, ISO 27001:2022, SOC 2, CIS Controls v8
  • OWASP Agentic Top 10 — ASI01 through ASI10 (agent autonomy, tool misuse, spawn persistence)
  • OWASP LLM Top 10 — LLM01 through LLM10 (7 categories triggered)
  • OWASP MCP Top 10 — MCP01 through MCP10 (8 categories triggered) — token exposure, tool poisoning, supply chain, shadow servers
  • MITRE ATLAS — AML.T0010, AML.T0043, AML.T0051, etc. (13 techniques mapped)
  • NIST AI RMF 1.0 — Govern, Map, Measure, Manage (12 subcategories mapped)
  • EU AI Act — ART-5 through ART-17 (prohibited practices, high-risk classification, cybersecurity)
  • NIST CSF 2.0 — Govern, Identify, Protect, Detect, Respond (14 categories mapped)
  • ISO 27001:2022 — Annex A controls A.5.19 through A.8.28 (9 controls mapped)
  • SOC 2 — Trust Services Criteria CC6 through CC9 (9 criteria mapped)
  • CIS Controls v8 — Safeguards CIS-02, CIS-07, CIS-16 (10 safeguards mapped)

CIS Controls v8 vs. CIS Benchmarks: agent-bom ships both. CIS Controls v8 maps generic security safeguards ("what to do"). Platform-specific CIS Benchmarks run live checks ("how to verify"): --aws-cis-benchmark (18 checks, IAM/Storage/Logging/Networking) and --snowflake-cis-benchmark (12 checks, Auth/Network/Data/Monitoring/Access). GCP, Azure, and Kubernetes benchmarks are planned.

AI-BOM export

agent-bom scan -f cyclonedx -o ai-bom.cdx.json   # CycloneDX 1.6
agent-bom scan -f spdx -o ai-bom.spdx.json       # SPDX 3.0
agent-bom scan -f sarif -o results.sarif           # GitHub Security tab
agent-bom scan -f json -o ai-bom.json             # Full AI-BOM
agent-bom scan -f html -o report.html              # Interactive dashboard
agent-bom scan -f mermaid                          # Mermaid supply chain diagram
agent-bom scan -f graph -o graph.json              # Cytoscape-compatible graph JSON

Policy-as-code

agent-bom scan --policy policy.json --fail-on-severity high

Supported policy conditions: severity_gte, is_kev, ai_risk, has_credentials, ecosystem, package_name_contains, min_agents, min_tools, unverified_server, registry_risk_gte, owasp_tag, owasp_mcp_tag, is_malicious, min_scorecard_score, max_epss_score, has_kev_with_no_fix. See policy.json for an example template.

Enterprise security operations

Posture scorecard — letter grade (A–F), numeric score (0–100), 6-dimension breakdown:

Dimension Weight Measures
Vulnerability Posture 30% Severity distribution, fix availability
Credential Hygiene 20% Credential exposure footprint
Supply Chain Quality 15% OpenSSF Scorecard coverage
Compliance Coverage 15% Threat framework tag mapping
Active Exploitation 10% KEV, high-EPSS presence
Configuration Quality 10% Registry verification, tool declarations

Incident correlation — group vulnerabilities by agent for SOC workflows:

  • Priority levels: P1 (KEV/multi-critical) → P2 (critical+creds) → P3 (high) → P4 (monitor)
  • Per-agent: unique CVEs, KEV IDs, exposed credentials, affected packages, recommended actions

Credential risk ranking — rank all exposed credentials by blast radius:

  • Risk tiers: critical (critical CVE exposure) → high → medium → low
  • Aggregated across all agents and servers per credential

Cloud provider discovery

See AI Infrastructure Scanning Guide for GPU container scanning examples (NVIDIA + AMD ROCm).

agent-bom scan --aws --aws-region us-east-1       # Bedrock, Lambda, EKS, ECS, EC2, Step Functions
agent-bom scan --aws --aws-cis-benchmark          # CIS AWS Foundations v3.0 (18 checks)
agent-bom scan --snowflake                         # Cortex Agents, MCP Servers, Search, Snowpark
agent-bom scan --snowflake-cis-benchmark          # CIS Snowflake Benchmark v1.0 (12 checks)
agent-bom scan --databricks                        # Cluster libraries, model serving
agent-bom scan --nebius --nebius-project-id proj   # GPU cloud K8s + containers
agent-bom scan --k8s --context=coreweave-cluster   # CoreWeave / any K8s
Cloud provider details
Provider Depth What's discovered Install
Snowflake Deep Cortex Agents, native MCP Servers, Search, Snowpark, Streamlit, query history, governance, activity, observability pip install 'agent-bom[snowflake]'
AWS Standard Bedrock agents, Lambda package extraction, EKS, ECS, Step Functions, EC2, SageMaker pip install 'agent-bom[aws]'
Databricks Preview Cluster packages, model serving endpoints pip install 'agent-bom[databricks]'
Azure Standard OpenAI deployments, Functions, Container Instances, ML endpoints, AI Foundry workspaces, Container Apps pip install 'agent-bom[azure]'
GCP Standard Vertex AI endpoints, Cloud Functions, GKE, Cloud Run pip install 'agent-bom[gcp]'
Nebius Preview Managed K8s, container services pip install 'agent-bom[nebius]'
CoreWeave Via K8s K8s-native — --k8s --context=coreweave-cluster (core CLI)
Ollama Standard Local model inventory via API + manifests (core CLI)

Snowflake is the deepest integration — includes governance audit (access history, privilege grants, data classification), agent activity timeline, and Cortex observability. Other providers have functional discovery at varying depth. PRs welcome.

Interactive security graph visualization

The dashboard (agent-bom api) serves interactive React Flow graphs:

  • Agent Mesh (/mesh) — cross-agent topology with vulnerability overlay, shared server detection, credential blast analysis
  • Attack Flow (/scan?view=attack-flow) — CVE-centric blast radius graph: CVE → Package → Server → Agent → Credentials → Tools
  • Supply Chain Lineage (/graph) — full dependency lineage with hover highlighting and detail panels
  • Context Graph (/context) — lateral movement analysis: agent-to-agent attack paths via shared servers, credentials, and tools
AI-powered enrichment

LLM-generated risk narratives, executive summaries, and threat chain analysis. Works with local Ollama (free) or 100+ providers via litellm.

agent-bom scan --ai-enrich                              # auto-detect Ollama
agent-bom scan --ai-enrich --ai-model ollama/llama3      # specific model
Supplemental advisory enrichment

Beyond OSV.dev, agent-bom checks supplemental sources to catch CVEs not yet indexed:

  • GitHub Security Advisories (GHSA) — all ecosystems (PyPI, npm, Go, Maven, Cargo, NuGet)
  • NVIDIA CSAF advisories — GPU/ML packages (CUDA, cuDNN, TensorRT, NCCL)

Both sources deduplicate by CVE ID against OSV results.

Deployment

Mode Command Best for
CLI agent-bom scan Local audit
Pre-install check agent-bom check [email protected] -e npm Before running MCP servers
GitHub Action uses: msaad00/[email protected] CI/CD + SARIF
Docker docker run agentbom/agent-bom scan Isolated scans
REST API agent-bom api Dashboards, SIEM
Runtime proxy agent-bom proxy Opt-in MCP traffic audit (per-server)
MCP Server agent-bom mcp-server Inside any MCP client
Dashboard agent-bom serve API + Next.js dashboard
Snowflake SNOWFLAKE_ACCOUNT=... agent-bom api Snowpark + SiS
Prometheus --push-gateway / --otel-endpoint Monitoring

GitHub Action

- uses: msaad00/[email protected]
  with:
    severity-threshold: high
    upload-sarif: true
    enrich: true
    fail-on-kev: true

REST API

pip install agent-bom[api]
agent-bom api --api-key $SECRET --rate-limit 30   # http://127.0.0.1:8422/docs
Endpoint Description
POST /v1/scan Start async scan
GET /v1/scan/{id} Results + status
GET /v1/scan/{id}/attack-flow Per-CVE blast radius graph
GET /v1/registry 427+ server registry
GET /v1/compliance Full 10-framework compliance posture
GET /v1/compliance/{framework} Single framework (owasp-llm, owasp-mcp, owasp-agentic, atlas, nist, eu-ai-act, nist-csf, iso-27001, soc2, cis)
GET /v1/posture Enterprise posture scorecard (grade A–F, 6 dimensions)
GET /v1/posture/credentials Credential risk ranking by blast radius
GET /v1/posture/incidents Incident correlation by agent (P1–P4)
POST /v1/traces OpenTelemetry trace ingestion + vulnerable tool call flagging
GET /v1/scan/{id}/context-graph Agent context graph + lateral movement paths
GET /v1/malicious/check Malicious package / typosquat check

MCP Server

pip install agent-bom[mcp-server]
agent-bom mcp-server                    # stdio
agent-bom mcp-server --transport sse    # remote

18 tools: scan, check, blast_radius, policy_check, registry_lookup, generate_sbom, compliance, remediate, verify, where, inventory, diff, skill_trust, marketplace_check, code_scan, context_graph, analytics_query, cis_benchmark

Cloud UI

cd ui && npm install && npm run dev   # http://localhost:3000

15-section Next.js dashboard:

Page Description
Dashboard Security posture summary + stat cards
Scan Enterprise scan form with cloud options
Vulnerabilities CVE browser with severity/EPSS/KEV filters
Agents Fleet registry + lifecycle state management
Compliance 10-framework compliance posture (OWASP Agentic, OWASP LLM, OWASP MCP, ATLAS, NIST AI RMF, EU AI Act, NIST CSF 2.0, ISO 27001, SOC 2, CIS Controls v8)
Lineage Graph Interactive supply chain graph — dagre layout, 7 node types, filter panel
Agent Mesh Cross-agent topology — shared server detection, credential blast radius, tool overlap
Gateway Runtime MCP policy rules + audit log
Registry 427+ MCP server browser
Fleet Agent trust scoring + fleet management
Activity Agent activity timeline + AI observability
Governance Snowflake access, privileges, data classification
Traces OpenTelemetry trace ingestion + vulnerable tool call flagging
Context Graph Lateral movement analysis — agent-to-agent attack paths, shared credentials, tool overlap
Jobs Background scan job management

Snowflake Deployment

pip install 'agent-bom[api,snowflake]'
Component Description
Snowflake Table Storage SnowflakeJobStore, SnowflakeFleetStore, SnowflakePolicyStore — auto-detect key-pair or password auth
Snowpark Container Services Dockerfile.snowpark + snowflake/setup.sql — run the API inside Snowflake
Streamlit in Snowflake snowflake/streamlit_app.py — 6-tab SiS dashboard reading from shared tables
Native App snowflake/native-app/ — Marketplace-distributable package

Set SNOWFLAKE_ACCOUNT + SNOWFLAKE_USER + auth (SNOWFLAKE_PRIVATE_KEY_PATH or SNOWFLAKE_PASSWORD) and the API auto-switches to Snowflake persistence.

See DEPLOYMENT.md for full Snowflake architecture and setup instructions.

Snowflake deployment architecture

Enterprise deployment topology

MCP Server Registry (427+ servers)

Registry of 427+ known MCP servers with risk levels, tool inventories, credential env vars, categories, and version pins. Risk levels are derived from server category (filesystem/shell = high, database/cloud = medium, search/monitoring = low). Credential env vars are inferred from package-name heuristics (21 patterns). Auto-synced weekly from the Official MCP Registry. 375 servers manually verified; 52 auto-enriched. Unverified servers trigger warnings. Policy rules can block them in CI.

Browse: mcp_registry.json | Expand: python scripts/expand_registry.py

AI supply chain coverage

Layer Coverage Examples
GPU/ML packages --image via Grype/Syft NVIDIA CUDA, cuDNN, TensorRT, AMD ROCm — flagged by package name matching
GPU clouds --k8s pod discovery CoreWeave, Lambda Labs, Nebius, Paperspace — image-level scanning
AI platforms Cloud modules Bedrock, Vertex AI, Snowflake Cortex, Databricks
Containers --image via Grype/Syft NVIDIA NGC, ROCm, vLLM, Triton, Ollama — any OCI image
AI frameworks Dependency scan LangChain, LlamaIndex, AutoGen, PyTorch, JAX, TensorFlow
Inference servers --image vLLM, Triton, TGI, llama.cpp
MLOps Dependency scan MLflow, W&B, Ray, ClearML
MCP ecosystem Auto-discovery + registry 20 clients, 427+ servers
LLM providers API key + SDK detection OpenAI, Anthropic, Cohere, Mistral
IaC + CI/CD --tf-dir, --gha Terraform AI resources, GitHub Actions

See AI Infrastructure Scanning Guide for GPU container scanning examples (NVIDIA + AMD ROCm).

Trust & permissions

  • --dry-run — preview every file and API URL before access, then exit without reading anything
  • PERMISSIONS.md — auditable trust contract with all config paths enumerated
  • Read-only — never writes configs, runs servers, provisions resources, or stores secrets
  • Credential redaction — only env var names in reports; values, tokens, passwords never read
  • Sigstore signed — releases v0.7.0+ signed via cosign OIDC; verify PyPI integrity with agent-bom verify [email protected] (SHA-256 + SLSA provenance)
  • No binary needed (MCP) — SSE transport requires zero local install; local CLI available for air-gapped use
  • OpenSSF Scorecardautomated supply chain scoring

Roadmap

Shipped:

  • Cloud AI inventory — AWS Bedrock, Azure AI Foundry, GCP Vertex, Snowflake Cortex, Databricks, Nebius
  • Tool poisoning / prompt injection detection — --enforce with description injection, capability combos, CVE exposure, drift
  • Model weight provenance — SHA-256 hash, Sigstore file detection, HuggingFace metadata (--model-provenance, --hf-model)
  • 20 MCP client discovery — JetBrains AI, Junie, Codex CLI, Gemini CLI, Goose, Snowflake CLI, full Cortex Code (CoCo) coverage
  • K8s AI workload discovery — --k8s --all-namespaces with pod-level scanning
  • OWASP MCP Top 10 compliance mapping — MCP01–MCP10 risk tagging
  • Malicious package detection — OSV MAL- prefix flagging + typosquat heuristics
  • OpenSSF Scorecard enrichment — --scorecard for package health scoring
  • AI framework package recognition — GPU/ML packages (CUDA, ROCm, vLLM, JAX, etc.) flagged as high-risk in image scans
  • Runtime MCP proxy — opt-in stdio proxy (agent-bom proxy) wraps individual MCP server commands for traffic interception; requires per-server client reconfiguration
  • Enterprise integrations — Jira, Slack, Vanta, Drata
  • Runtime sidecar Docker container — Dockerfile.runtime + Docker Compose for MCP proxy deployment
  • EU AI Act compliance mapping — ART-5 through ART-17 risk classification
  • OWASP Agentic Top 10 — ASI01 through ASI10 agent-specific risk tagging
  • Marketplace trust check — marketplace_check MCP tool for pre-install validation
  • OpenTelemetry trace ingestion — POST /v1/traces for vulnerable tool call flagging
  • CMMC/FedRAMP compliance evidence export — --compliance-export ZIP bundles
  • Agent spawn tree visualization — parent-child delegation chains
  • RSP v3.0 alignment badge — Anthropic Responsible Scaling Policy compliance indicator
  • Claude Code config security scanner — Check Point CVE vector detection
  • Over-permission analyzer — mission profile enforcement per agent type
  • Alert pipeline — AlertDispatcher with Slack, webhook, and in-memory channels; auto-trigger on scan
  • Runtime protection engine — unified 5-detector orchestration with OTel trace ingestion
  • Multi-tenant fleet — tenant_id scoping, X-Tenant-ID header, per-tenant stats
  • Enterprise posture scorecard — letter grade (A–F), 6-dimension breakdown, auto-computed in scan output
  • Incident correlation — per-agent vulnerability grouping with P1–P4 priority for SOC workflows
  • Credential risk ranking — blast radius severity ranking for all exposed credentials
  • Slack blast radius enrichment — webhook payloads include risk score, agents, credentials, fix versions
  • Advanced policy conditions — min_scorecard_score, max_epss_score, has_kev_with_no_fix
  • Enterprise hardening — bounded caches, SQLite indexes, stuck job cleanup, Content-Length validation
  • Agent context graph — lateral movement analysis via shared servers, credentials, and tools; BFS attack path discovery
  • Enterprise security hardening — per-job thread locks, SSRF protection, error sanitization, RBAC least privilege, path traversal guards
  • NIST CSF 2.0 compliance mapping (14 categories across Govern, Identify, Protect, Detect, Respond)
  • ISO 27001:2022 compliance mapping (9 Annex A controls, A.5.19–A.8.28)
  • SOC 2 Trust Services Criteria (9 criteria, CC6–CC9)
  • CIS Controls v8 (10 safeguards, CIS-02/CIS-07/CIS-16)
  • Critical-only severity triggers (EU AI Act ART-5 Prohibited Practices)
  • SSH/OAuth/PKI/SCIM credential detection
  • SAST code scanning — Semgrep wrapper with CWE-based compliance mapping across all 10 frameworks (code_scan MCP tool)
  • NVD vulnerability status tracking — Analyzed/Modified/Rejected status per CVE + remediation source links from NVD references
  • CVE-level compliance tagging — per-vulnerability framework mapping across all 10 frameworks (severity, KEV, EPSS, CWE, AI package, fix availability)
  • CIS AWS Foundations Benchmark v3.0 — 18 live checks across IAM, Storage, Logging, Networking (--aws-cis-benchmark)
  • CIS Snowflake Benchmark v1.0 — 12 live checks across Auth, Network, Data Protection, Monitoring, Access Control (--snowflake-cis-benchmark)

Planned:

  • Platform-specific CIS Benchmarks:
    • GCP Foundations Benchmark v3.0
    • Azure Foundations Benchmark v2.1
    • Kubernetes Benchmark v1.9
  • Snowflake org-level multi-account CIS evaluation
  • License compliance engine
  • Workflow engine scanning (n8n, Zapier, Make)

Contributing

git clone https://github.com/msaad00/agent-bom.git && cd agent-bom
pip install -e ".[dev]"
pytest && ruff check src/

See CONTRIBUTING.md | SECURITY.md | CODE_OF_CONDUCT.md | Skills

Apache 2.0 — LICENSE

MCP Server · Populars

MCP Server · New

    mksglu

    Context Mode

    MCP is the protocol for tool access. We're the virtualization layer for context.

    Community mksglu
    Altinity

    Altinity MCP Server

    Model Context Protocol server to use ClickHouse® databases in your AI agents

    Community Altinity
    Vexa-ai

    Vexa

    Open-source meeting transcription API for Google Meet, Microsoft Teams & Zoom. Auto-join bots, real-time WebSocket transcripts, MCP server for AI agents. Self-host or use hosted SaaS.

    Community Vexa-ai
    imran-siddique

    AgentOS MCP Server

    A Safety-First Kernel for Autonomous AI Agents - POSIX-inspired primitives with 0% policy violation guarantee

    Community imran-siddique
    openclaw

    🦞 OpenClaw — Personal AI Assistant

    Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

    Community openclaw