What is Aguara?
Aguara is a static security scanner built specifically for AI agent skills and MCP (Model Context Protocol) server configurations. It detects prompt injection, data exfiltration, and supply-chain attacks before they reach production using deterministic static analysis that requires no API keys, no cloud, and no LLM. Think of Aguara as “Semgrep for AI agents” - purpose-built to scan the skill files, tool descriptions, and MCP configs that agents consume, rather than application source code.Why Aguara?
AI agents and MCP servers run code on your behalf. A single malicious skill file can exfiltrate credentials, inject prompts, or install backdoors. Traditional SAST tools target application source code and miss the threats embedded in AI agent content.Key Features
177 Detection Rules
Across 13 categories: prompt injection, credential leaks, data exfiltration, supply-chain attacks, MCP-specific threats, command execution, SSRF, unicode attacks, and more.
4-Layer Analysis
Pattern matching, NLP-based markdown analysis, taint tracking, and rug-pull detection work together to catch threats that any single technique would miss.
Confidence Scoring
Every finding carries a confidence level (0.0-1.0), so you can prioritize triage and filter noise.
Remediation Guidance
High-impact rules include actionable fix suggestions in the scan output.
Deterministic
Same input, same output. Every scan is reproducible with no LLM randomness.
CI-Ready
JSON, SARIF, and Markdown output. GitHub Action.
--fail-on threshold. --changed for incremental scans.Problems Aguara Solves
Malicious Skills
Skill registries and untrusted sources can distribute malicious content disguised as helpful tools:Prompt Injection
Hidden instructions in markdown, code blocks, or comments that override agent behavior:- Instruction override attempts (“ignore all previous instructions”)
- Role switching (“you are now a jailbroken AI”)
- Delimiter injection to break out of context
- Event injection via comments and metadata
Data Exfiltration
Skills that combine reading sensitive data with network access:Supply Chain Attacks
- Download-and-execute patterns
- Reverse shells and remote code execution
- Unpinned dependencies that can be hijacked
- Obfuscated commands via base64/hex encoding
How It Works
Aguara runs 4 analysis layers sequentially on every file:Pattern Matcher
Regex and contains matching against 177 YAML rules. Includes base64/hex decoder that automatically decodes suspicious blobs and re-scans them. Downgrades severity for matches inside markdown code blocks.
NLP Analyzer
Goldmark AST walker that detects prompt injection in markdown structure - instruction overrides, role-switching, and jailbreaks via keyword classification on headings, paragraphs, and list items.
Taint Tracker
Source-to-sink flow analysis that catches dangerous capability combinations: reading private data + writing to external URLs, environment variables flowing to shell execution, API responses piped to eval.
Architecture Highlights
- Single Go binary - no runtime dependencies, fully offline
- 17 MCP clients supported - auto-discover configs from Claude Desktop, Cursor, VS Code, Windsurf, and 13 more
- Extensible - write custom rules in YAML, no code required
- Go library API - embed the scanner in your own tools (see Aguara MCP)
What’s Next?
Installation
Install Aguara via curl script, Homebrew, Docker, or from source
Quick Start
Get your first scan running in under 2 minutes
Comparison with SAST Tools
Aguara complements traditional SAST - use Semgrep for your application code, Aguara for your agent skills and MCP servers.| Feature | Aguara | Semgrep | Snyk Code | CodeQL |
|---|---|---|---|---|
| AI agent skill scanning | ✅ | ❌ | ❌ | ❌ |
| MCP config analysis | ✅ | ❌ | ❌ | ❌ |
| Prompt injection detection | ✅ (18 rules + NLP) | ❌ | ❌ | ❌ |
| Rug-pull detection | ✅ | ❌ | ❌ | ❌ |
| Taint tracking | ✅ | ✅ | ✅ | ✅ |
| Offline / no account | ✅ | Partial | ❌ | Partial |
| Custom YAML rules | ✅ | ✅ | ❌ | ❌ |
| Free & open source | ✅ Apache 2.0 | Partial | ❌ | Partial |
