Aguara Security Scanner
Detect prompt injection, data exfiltration, and supply-chain attacks in AI agent skills and MCP servers before they reach production. 177 rules. 4-layer analysis. No API keys, no cloud, no LLM.
Why Aguara?
AI agents and MCP servers run code on your behalf. A single malicious skill file can exfiltrate credentials, inject prompts, or install backdoors. Aguara catches these threats before deployment with static analysis that requires no API keys, no cloud, and no LLM.177 Detection Rules
Across 13 categories: prompt injection, data exfiltration, credential leaks, supply-chain attacks, MCP-specific threats, and more
4-Layer Analysis Engine
Pattern matching, NLP-based markdown analysis, taint tracking, and rug-pull detection work together to catch threats
CI-Ready Integration
JSON, SARIF, and Markdown output. GitHub Action with Code Scanning. Exit codes for pipeline control
Fully Offline
Deterministic scans with no API keys, no cloud calls, no LLM. Same input, same output, every time
Quick Start
Scan Your Skills
Auto-discover and scan all MCP configs on your machine, or scan a specific directory:
Key Features
MCP Discovery
Auto-detect configs across 17 clients including Claude Desktop, Cursor, VS Code, Windsurf, and more
Confidence Scoring
Every finding carries a 0.0-1.0 confidence level for prioritizing triage and filtering noise
Custom Rules
Write custom detection rules in YAML without code
Go Library API
Embed Aguara in your own tools with the public Go API
Rug-Pull Detection
Track file hashes across scans to catch tool descriptions that change after review
Multiple Outputs
Terminal, JSON, SARIF, and Markdown formats for different workflows
Get Started
Installation
Install Aguara using curl, Homebrew, Docker, or from source
Quick Start
Get scanning in under 2 minutes with our quickstart guide
CLI Usage
Learn all CLI commands and flags for scanning and discovery
CI/CD Integration
Integrate Aguara into your CI/CD pipeline with GitHub Actions, GitLab CI, or Docker
Detection Categories
Prompt Injection (18 rules + NLP)
Prompt Injection (18 rules + NLP)
Detects instruction overrides, role switching, delimiter injection, jailbreaks, fake system prompts, and event injection patterns
Data Exfiltration (16 rules + NLP)
Data Exfiltration (16 rules + NLP)
Catches webhook exfil, DNS tunneling, sensitive file reads, environment variable leaks, and credential transmission
Credential Leak (22 rules)
Credential Leak (22 rules)
Identifies API keys (OpenAI, AWS, GCP, Stripe, Anthropic, GitHub), private keys, database strings, and HMAC secrets
Supply Chain (21 rules)
Supply Chain (21 rules)
Finds download-and-execute patterns, reverse shells, sandbox escape attempts, symlink attacks, and privilege escalation
MCP Attack (16 rules)
MCP Attack (16 rules)
Detects tool injection, name shadowing, canonicalization bypass, capability escalation, and server manifest tampering
Command Execution (15 rules)
Command Execution (15 rules)
Identifies shell=True, eval, subprocess, child_process, PowerShell, and terminal multiplexer command injection
View All 177 Rules
Browse the complete rule catalog with IDs, severity levels, and examples
Ecosystem
Aguara MCP
MCP server that gives AI agents the ability to scan skills before installing them
Aguara Watch
Continuously scans 28,000+ AI agent skills across 5 registries to track the threat landscape
