barvhaim/HoneyMCP

A Deception Security Layer for MCP Servers. It injects "ghost tools" (fake security-sensitive tools) that act as honeypots.

45
/ 100
Emerging

This project adds a crucial deception layer to your Model Context Protocol (MCP) server, detecting sophisticated AI agent attacks. It injects 'ghost tools' that act as honeypots, trapping agents attempting to steal data or inject malicious prompts. Server administrators and security engineers can monitor these attacks via a live dashboard.

Available on PyPI.

Use this if you manage an MCP server and need to protect sensitive data and AI agents from new types of AI-driven attacks like data exfiltration and indirect prompt injection.

Not ideal if your system does not involve Model Context Protocol (MCP) servers or AI agents interacting with tools, as its core functionality is designed for this specific environment.

AI Security Deception Technology Threat Detection Cybersecurity Large Language Model Operations
Maintenance 10 / 25
Adoption 6 / 25
Maturity 20 / 25
Community 9 / 25

How are scores calculated?

Stars

18

Forks

2

Language

Python

License

Last pushed

Feb 09, 2026

Commits (30d)

0

Dependencies

15

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/barvhaim/HoneyMCP"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.