Supported Clients
Aguara auto-detects MCP configurations from the following clients:| Client | Config Locations |
|---|---|
| Claude Desktop | ~/Library/Application Support/Claude/ (macOS)~/.config/claude/ (Linux)%APPDATA%\Claude\ (Windows) |
| Cursor | ~/.cursor/mcp.json |
| VS Code | ~/.vscode/mcp.json |
| Cline | ~/.cline/mcp_settings.json |
| Windsurf | ~/.windsurf/mcp.json~/.codeium/windsurf/mcp_config.json |
| OpenClaw | ~/.openclaw/openclaw.json |
| OpenCode | ~/.config/opencode/opencode.json |
| Zed | ~/.config/zed/settings.json |
| Amp | ~/.config/amp/settings.json |
| Gemini CLI | ~/.gemini/settings.json |
| Copilot CLI | ~/.copilot/mcp-config.json |
| Amazon Q | ~/.aws/amazonq/mcp.json |
| Claude Code | ~/.claude.json |
| Roo Code | VS Code global storage |
| Kilo Code | VS Code global storage |
| BoltAI | ~/.boltai/mcp.json (macOS) |
| JetBrains | ~/.junie/mcp/mcp.json |
Discovery Commands
List All MCP Configs
Discover which MCP clients are configured on your system without scanning:JSON Output
Get discovery results as JSON for programmatic use:Auto-Discovery + Scan
Discover all MCP configurations and scan them in one command:- Running
aguara discoverto find all MCP configs - Extracting the
command,args, andenvfrom each server - Scanning all referenced files and scripts
How It Works
Config Parsing
Aguara reads MCP client configuration files and extracts server definitions. Most clients use a standard format:- VS Code: Uses
serversinstead ofmcpServers - Zed: Uses
context_servers - OpenCode: Nested under
mcp.servers - Claude Code: Nested under
mcp.mcpServers - OpenClaw: Custom TOML-like format in
openclaw.json
Path Resolution
For each discovered server, Aguara:- Resolves the
command(e.g.,node,python,npx) - Locates the script file from
args(e.g.,server.js,-m module_name) - Scans the script and any related files for security issues
- Checks environment variables for hardcoded credentials
Security Analysis
When you runaguara scan --auto, all discovered servers are analyzed for:
- Hardcoded API keys and secrets in config
envblocks - Unpinned
npxpackages (e.g.,npx -y packagewithout version) - Dangerous command flags (
--allow-all,shell=True) - Docker security issues (
--cap-add,--privileged,--network=host) - Server script vulnerabilities (prompt injection, command execution, exfiltration)
Use Cases
Pre-Deployment Audit
Before deploying an MCP server to production, scan all configured servers:CI Integration
Add MCP config scanning to your GitHub Actions workflow:Development Workflow
After installing a new MCP server, check for security issues:Multi-Client Monitoring
If you use multiple AI assistants (Claude Desktop + Cursor + VS Code), discover and scan all of them at once:Limitations
- File System Access: Discovery requires read access to client config directories
- Cross-Platform: Some clients (like BoltAI) are macOS-only
- Custom Locations: Non-standard config paths won’t be auto-detected (use
aguara scan <path>instead) - Server Code: Aguara scans local server scripts, but can’t analyze remote
npxpackages until they’re installed
Related
- Rug-Pull Detection — Track config changes across scans
- Incremental Scanning — Scan only modified files
- Output Formats — Format discovery results for CI/CD
