barvhaim/HoneyMCP
A Deception Security Layer for MCP Servers. It injects "ghost tools" (fake security-sensitive tools) that act as honeypots.
This project adds a crucial deception layer to your Model Context Protocol (MCP) server, detecting sophisticated AI agent attacks. It injects 'ghost tools' that act as honeypots, trapping agents attempting to steal data or inject malicious prompts. Server administrators and security engineers can monitor these attacks via a live dashboard.
Available on PyPI.
Use this if you manage an MCP server and need to protect sensitive data and AI agents from new types of AI-driven attacks like data exfiltration and indirect prompt injection.
Not ideal if your system does not involve Model Context Protocol (MCP) servers or AI agents interacting with tools, as its core functionality is designed for this specific environment.
Stars
18
Forks
2
Language
Python
License
—
Category
Last pushed
Feb 09, 2026
Commits (30d)
0
Dependencies
15
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/barvhaim/HoneyMCP"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
Wh0am123/MCP-Kali-Server
MCP configuration to connect AI agent to a Linux machine.
DMontgomery40/pentest-mcp
NOT for educational purposes: An MCP server for professional penetration testers including...
BurtTheCoder/mcp-shodan
MCP server for Shodan — search internet-connected devices, IP reconnaissance, DNS lookups, and...
cyproxio/mcp-for-security
MCP for Security: A collection of Model Context Protocol servers for popular security tools like...
0x4m4/hexstrike-ai
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot,...