appsecco/pentesting-mcp-servers-checklist

A practical, community-driven checklist for pentesting MCP servers. Covers traffic analysis, tool-call behavior, namespace abuse, auth flows, and remote server risks. Maintained by Appsecco and licensed for remixing.

38
/ 100
Emerging

This checklist provides a structured guide for security professionals assessing the safety of Model Context Protocol (MCP) servers. It helps identify vulnerabilities across traffic, authentication, file systems, and tool interactions. Security testers and penetration testers working with AI agents and MCP-based systems will find this useful for systematic evaluations.

Use this if you are a security professional performing a penetration test or security assessment on a system that uses MCP servers or AI agents.

Not ideal if you are looking for an automated scanning tool or an academic paper on AI security theory.

penetration-testing security-auditing AI-security vulnerability-assessment red-teaming
No Package No Dependents
Maintenance 6 / 25
Adoption 7 / 25
Maturity 13 / 25
Community 12 / 25

How are scores calculated?

Stars

27

Forks

4

Language

License

CC-BY-4.0

Last pushed

Dec 18, 2025

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/appsecco/pentesting-mcp-servers-checklist"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.