Prerequisites
- Linux, macOS, or Windows with WSL
- One of: skills directory, MCP server configs, or AI agent content to scan
Get Started
Install Aguara
Choose your preferred installation method:Verify installation:
The install script places the binary in
~/.local/bin. Make sure this directory is in your $PATH.Run Your First Scan
Choose a scanning scenario that matches your use case:This automatically finds and scans configs from Claude Desktop, Cursor, VS Code, Windsurf, and 13 other clients.
Scan a Skills Directory
If you have AI agent skills in.claude/skills/:Auto-Discover MCP Configs
Scan all MCP configurations on your machine:Scan a Single File
Test with a specific skill or config file:Scan Current Directory
Scan all files in the current directory recursively:Review the Findings
Aguara outputs a detailed security report with:
- Severity Dashboard: Summary of findings by severity level
- Findings List: Each finding with file location, matched text, and context
- Top Files Chart: Files with the most security issues
Example Output
Terminal Output
Understanding Severity Levels
| Severity | Meaning | Action |
|---|---|---|
| CRITICAL | Active threat (instruction override, credential exfil, reverse shell) | Fix immediately before deployment |
| HIGH | Dangerous capability (hardcoded keys, shell injection, SSRF) | Review and remediate |
| MEDIUM | Risky pattern (unpinned deps, suspicious network access) | Assess risk and fix if needed |
| LOW | Potential issue (weak validation, missing checks) | Consider fixing |
| INFO | Informational (best practice, suggestion) | Optional improvement |
Common Scanning Scenarios
Scan Before Installing a Skill
Before installing a skill from a registry or untrusted source:Scan Your MCP Server Configurations
Check all MCP configs for hardcoded secrets, unpinned dependencies, and insecure settings:Pre-Commit Hook for Skills Repository
Scan only changed files before committing:Filter Noise with Severity Threshold
See only the most important findings:Get Detailed Context
Show full rule descriptions, confidence scores, and remediation guidance:Example Verbose Output
Export Results for Review
JSON Format (Machine-Readable)
Perfect for CI/CD pipelines, custom tooling, or importing into other systems:SARIF Format (GitHub Code Scanning)
Upload to GitHub Code Scanning or other SARIF-compatible tools:Markdown Format (PR Comments)
Great for GitHub Actions job summaries or posting to pull requests:What Aguara Detects
Aguara scans for threats across 13 security categories:Prompt Injection (18 rules + NLP)
Prompt Injection (18 rules + NLP)
- Instruction override attempts
- Role switching and jailbreaks
- Delimiter injection
- Hidden instructions in comments
- Event injection via markdown
Credential Leaks (22 rules)
Credential Leaks (22 rules)
- OpenAI, Anthropic, AWS, GCP, Azure API keys
- GitHub tokens and SSH private keys
- Database connection strings
- HMAC secrets and JWT tokens
Data Exfiltration (16 rules)
Data Exfiltration (16 rules)
- Webhook exfiltration patterns
- DNS tunneling
- Sensitive file reads (
~/.ssh/,/etc/passwd) - Environment variable leaks
Supply Chain Attacks (21 rules)
Supply Chain Attacks (21 rules)
- Download-and-execute patterns
- Reverse shells
- Sandbox escape attempts
- Obfuscated commands (base64/hex)
MCP-Specific Threats (16 rules)
MCP-Specific Threats (16 rules)
- Tool injection and name shadowing
- Manifest tampering
- Capability escalation
- Config canonicalization bypass
Command Execution (15 rules)
Command Execution (15 rules)
shell=Truepatternseval()andexec()usage- Subprocess and child_process
- PowerShell and bash injection
Next Steps
Now that you’ve run your first scan, explore more features:CLI Usage
Master all scanning options and flags
Configuration
Customize Aguara with
.aguara.yml and ignore patternsCI Integration
Add Aguara to your CI/CD pipeline
Custom Rules
Write your own detection rules in YAML
Common Questions
How fast is Aguara?
How fast is Aguara?
Aguara is extremely fast - it can scan thousands of files per second. Most skill directories complete in under 100ms. The scanner is written in Go and uses parallel analysis with worker pools.
Does Aguara send data to the cloud?
Does Aguara send data to the cloud?
No. Aguara is 100% offline. It never makes network requests, never sends telemetry, and requires no API keys or accounts. All analysis happens locally using deterministic static analysis.
Can I use Aguara in CI/CD?
Can I use Aguara in CI/CD?
Yes! Aguara is CI-ready with:
- JSON and SARIF output formats
--fail-onthreshold to fail builds--cimode for clean, non-colored output- Official GitHub Action
- Docker image for any CI platform
What if I get false positives?
What if I get false positives?
You can suppress false positives using:
- Inline ignore comments:
# aguara-ignore RULE_ID .aguaraignorefile for paths- Rule overrides in
.aguara.yml - Severity downgrade for specific rules
How do I scan MCP configs only?
How do I scan MCP configs only?
Use
aguara discover to list all MCP clients, then either:Need Help?
View Examples
See more CLI usage examples and advanced patterns
Report Issues
Found a bug or have a feature request?
