Have I Been Pwned — but for every MCP server on the internet.
npx mcpwatch-scanner /path/to/your/mcp
| # | Server | Grade | Score | Findings |
|---|---|---|---|---|
| Loading… | ||||
30 CVEs in MCP servers in the last 60 days. 43% of public MCPs are vulnerable to command injection. 82% to path traversal. One popular GitHub MCP leaked private repository data because of a prompt injection. Teams install random MCPs every day with no safety signal whatsoever.
MCPWatch continuously crawls every public MCP server, runs 10 OWASP-aligned checks, and publishes a public A–F letter grade. Free forever. Open source. MIT.