GuardianShield
Universal AI security layer — an open-source MCP server for code scanning, PII detection, prompt injection defense, secret detection, dependency auditing, and audit logging.
Zero dependencies · 16 MCP tools · 5 safety profiles · 75+ detection patterns
Features
- Code Vulnerability Scanning — SQL injection, XSS, command injection, path traversal with CWE IDs and auto-fix remediation
- Dependency Security — Version-aware CVE matching against OSV.dev for PyPI, npm, Go, and Packagist ecosystems
- Manifest Parsing — Auto-detects 11 formats (requirements.txt, package.json, yarn.lock, go.mod, composer.json, and more)
- Prompt Injection Defense — 9+ detection patterns for instruction override, role hijacking, ChatML injection
- PII Detection — Email, SSN, credit card, phone, IP — with automatic redaction in findings
- Secret Detection — AWS keys, GitHub tokens, Stripe keys, JWTs, passwords, connection strings
- Safety Profiles — 5 built-in profiles (general, education, healthcare, finance, children)
- Audit Logging — SQLite-backed scan history with finding retrieval and filtering
Install
pip install guardianshield
Quick Start
# Register with Claude Code
claude mcp add guardianshield -- guardianshield-mcp
# Or run directly
guardianshield-mcp
Editor Integration
# Claude Code
claude mcp add guardianshield -- guardianshield-mcp
# VS Code (.vscode/mcp.json)
{"servers": {"guardianshield": {"type": "stdio", "command": "guardianshield-mcp"}}}
# Cursor (.cursor/mcp.json)
{"mcpServers": {"guardianshield": {"command": "guardianshield-mcp"}}}
# Claude Desktop (claude_desktop_config.json)
{"mcpServers": {"guardianshield": {"command": "guardianshield-mcp"}}}
MCP Tools
Scanning
| Tool | Description |
|---|---|
scan_code |
Scan source code for vulnerabilities and hardcoded secrets |
scan_file |
Scan a single file (auto-detects language from extension) |
scan_directory |
Recursively scan a directory with filtering and progress streaming |
scan_input |
Check user/agent input for prompt injection attempts |
scan_output |
Check AI output for PII leaks and content violations |
check_secrets |
Detect hardcoded secrets and credentials |
Dependency Security
| Tool | Description |
|---|---|
check_dependencies |
Check packages for known CVEs via OSV.dev (PyPI, npm, Go, Packagist) |
sync_vulnerabilities |
Sync the local OSV vulnerability database |
parse_manifest |
Parse any supported manifest file (11 formats) into dependency objects |
scan_dependencies |
Scan a directory for manifest files and check all deps for vulnerabilities |
Configuration & Utilities
| Tool | Description |
|---|---|
get_profile |
Get current safety profile configuration |
set_profile |
Switch safety profile (general, education, healthcare, finance, children) |
test_pattern |
Test a regex pattern against sample code for custom pattern development |
audit_log |
Query the security audit log |
get_findings |
Retrieve past findings with filters |
shield_status |
Get health, configuration, and OSV cache statistics |
Configuration
Set environment variables to customize behavior:
| Variable | Description | Default |
|---|---|---|
GUARDIANSHIELD_PROFILE |
Default safety profile | general |
GUARDIANSHIELD_AUDIT_PATH |
Path to SQLite audit database | ~/.guardianshield/audit.db |
GUARDIANSHIELD_DEBUG |
Enable debug logging (1) |
disabled |
Documentation
Full documentation: sparkvibe-io.github.io/GuardianShield
License
Apache 2.0