Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.q-uestionable.ai/llms.txt

Use this file to discover all available pages before exploring further.

The audit module scans MCP servers by enumerating exposed tools, resources, and prompts, then running security checks mapped to the OWASP MCP Top 10, MITRE ATLAS, CWE, and OWASP Agentic Top 10. It produces structured findings with severity ratings and remediation guidance.

What It Tests

MCP servers execute real actions — running commands, querying databases, writing files. When misconfigured or compromised, they can leak credentials, escalate privileges, inject instructions into agent workflows, or execute arbitrary commands. The audit module checks for these issues systematically.

How It Works

The audit scanning pipeline follows four steps:
  1. Connect — Establish a connection to the target MCP server (stdio, SSE, or Streamable HTTP)
  2. Enumerate — Discover all tools, resources, and prompts exposed by the server
  3. Scan — Run each scanner module against the server’s attack surface (static analysis, dynamic probing, or both)
  4. Report — Output findings in JSON, SARIF, HTML, NDJSON, or CSV format with framework mappings

Scanner Categories

The audit module includes 10 scanner modules, each targeting one OWASP MCP Top 10 category:
ScannerCategoryChecks
token_exposureToken Mismanagement & Secret ExposureCredential leakage in schemas, responses, error messages
permissionsPrivilege Escalation via ToolsExcessive tool counts, dangerous categories, unconstrained parameters
tool_poisoningTool PoisoningEmbedded instructions, Unicode tricks, suspicious patterns
supply_chainSupply Chain & IntegrityServer identity, CVE checking, tool provenance
injectionCommand Injection via ToolsShell injection, argument injection, path traversal payloads
prompt_injectionIndirect Prompt InjectionInjection patterns in tool responses
authInsufficient Authentication/AuthorizationUnauthenticated enumeration, unencrypted transports
audit_telemetryInsufficient Audit & TelemetryLogging, monitoring, error handling capabilities
shadow_serversShadow MCP ServersDevelopment markers, unmanaged deployment indicators
context_sharingContext Over-SharingSession data leakage, context oversharing, resource scope

Report Formats

Generate findings in any format:
  • JSON — Programmatic consumption, database integration
  • SARIF — GitHub Code Scanning integration, CI/CD automation
  • HTML — Human-readable reports with interactive navigation
  • NDJSON — Streaming format for large scan results
  • CSV — Spreadsheet analysis and reporting
SARIF output integrates directly with GitHub Code Scanning. Use gh code-scanning upload-sarif to publish audit findings in your repository.

Framework Mapping

Every finding is mapped to multiple security frameworks:
  • OWASP MCP Top 10 — Agentic AI security framework specific to MCP
  • OWASP Agentic Top 10 — Broader agentic AI security categories
  • MITRE ATLAS — Machine learning attack tactics and techniques
  • CWE — Software weakness catalog for root cause tracking
Mappings enable integration with your existing security tools and compliance workflows.

What to Expect

Audit is automated. Run qai audit scan, select scanners (or run all), and get a structured report. No manual iteration, no payload crafting. Scanners can be individually selected via --checks. New scanners can be added by subclassing BaseScanner and registering in the scanner registry.

Next Steps