Visibility and enforcement for every MCP server, skill, plugin, and remote endpoint — before it reaches your AI stack.
curl -fsSL https://truvant.ai/install.sh | sh
AI agents can only execute commands explicitly allowed by your security policy — including plugin installations.
Plugin supply chain case study →
|
Rogue AI database deletion →
SAST, SCA, and secrets detection on MCP server packages, skills, and plugins before they enter your environment. Know what you're running before you run it.
Security policies gate every installation — MCP servers, skills, and plugins that don't meet your score threshold are blocked automatically. Command-level policies control what AI agents can execute.
Background agent watches for supply-chain changes — new versions, dependency shifts, permission escalations — and alerts your team in real time.
SARIF v2.1.0 output plugs directly into GitHub Code Scanning, GitLab SAST, and Azure DevOps. Every finding maps to MITRE ATLAS, OWASP Top 10 for LLM, and OWASP Top 10 for Agentic Applications.
Real output from Truvant. No mockups.
Every MCP server, skill, and plugin gets a risk score and detailed findings mapped to industry frameworks.
AI-powered research agent probes remote MCP endpoints for TLS configuration, publisher verification, and tool risk classification.
Centralized visibility across every host, MCP server, plugin, and skill in your organization.
| Host | MCP Servers | Plugins | Violations | Last Seen |
|---|---|---|---|---|
| eng-mac-014 | 8 | 3 | 2 | 2m ago |
| eng-mac-027 | 6 | 5 | 1 | 5m ago |
| devops-linux-03 | 12 | 2 | 0 | 1m ago |
| sec-mac-001 | 4 | 1 | 4 | 12m ago |
Lightweight agent runs as a system service, watching for new installations, config changes, and policy violations.
Every command your AI agents execute is logged locally with the decision, matched rule, and calling agent. Your security team sees exactly what happened, when, and why.
Audit logs rotate automatically (5 MB / 7 days). Signal files are consumed by SIEM (Microsoft Defender for Endpoint).
SARIF v2.1.0 output drops into GitHub Code Scanning, GitLab SAST, and Azure DevOps with zero adapters.
Every finding includes MITRE ATLAS, OWASP LLM, and OWASP Agentic framework references in the SARIF taxonomy.
Fleet-wide visibility into every AI agent extension, with policy enforcement that actually stops threats — not just alerts.
Hosts, alerts, MCP servers, plugins, skills, and at-risk items — across your entire organization.
Command-level policies for kubectl, terraform, aws, psql, and more. Allow or deny at the binary level.
Full audit trail with filters by severity, binary, hostname. Expand any event to see the policy rule that matched.
Violation scores, risk timelines, and host tracking for every flagged MCP server, plugin, or skill.
Other tools monitor agent behavior at runtime. Truvant controls what agents can install, what commands they can run, and what tools they can call — before anything executes. No other product does all four for AI agent extensions.
| Capability | Truvant | HiddenLayerAI model security | ZenityAI agent governance | ObsidianSaaS security | StraikerAI agent guardrails |
|---|---|---|---|---|---|
| Pre-Install Artifact Scanning | |||||
| Source Code Analysis (SAST) Static analysis of MCP server and plugin source code | YesPython, shell, JS/TS | No | No | No | No |
| Dependency Vulnerabilities (SCA) Known CVEs in transitive dependencies | YesOSV + Trivy/Grype | No | No | No | No |
| Secrets Detection Hardcoded API keys, tokens, private keys in source | Yes25 rule types | No | No | No | No |
| Container Image Scanning Layer extraction, SBOM generation | Yes | No | No | No | No |
| MCP Tool Schema Analysis Tool poisoning, shadowing, overly broad schemas | Yes | No | PartialConfig-level | No | PartialHygiene checks |
| Skill & Plugin Scanning Prompt injection, data exfiltration, role hijacking | Yes37+ skill, 52+ hook rules | No | No | No | No |
| Install-Time Enforcement | |||||
| Plugin Install Interception Quarantine, scan, and gate before plugins load | YesScan before load | No | No | No | No |
| Risk Threshold Policy Gate Org-configurable score thresholds with admin overrides | YesServer-side policy | No | No | No | No |
| Admin Approval Workflow Dashboard review of blocked plugins with approve/deny | YesSARIF + findings in dashboard | No | No | No | No |
| AI Tool Integration Seamless enrollment into Claude Code, Cursor, Copilot | YesAutomatic enrollment | No | No | No | No |
| Runtime Enforcement | |||||
| System Command Interception Block ssh, kubectl exec, git push --force from agents | YesSubcommand-level granularity | No | No | No | No |
| AI Agent Caller Detection Only enforce on AI agents — humans pass through unaffected | YesClaude, Cursor, Copilot | No | No | No | No |
| MCP Tool-Call Policy (HTTP) Per-tool allow/deny on remote MCP endpoints | YesPer-tool allow/deny | PartialBehavioral monitoring | YesAgent-level interception | No | YesMCP proxy server |
| MCP Tool-Call Policy (Local Stdio) Policy enforcement on local MCP servers (npx, uvx) | YesTransparent enforcement | No | PartialEndpoint agent | No | No |
| Tamper Protection Detects and alerts on bypass attempts | YesMandatory enforcement mode | No | No | No | No |
| Monitoring & Compliance | |||||
| Continuous Monitoring File watcher, periodic rescan, drift detection | Yesfsnotify + periodic rescan | YesRuntime behavioral | YesAgent observability | YesSaaS activity | YesRuntime inspection |
| SIEM Integration Signal files for endpoint security and SIEM platforms | YesMDE signal files, JSONL | Unclear | Unclear | YesSentinel, CrowdStrike | Unclear |
| SARIF CI/CD Output GitHub Code Scanning, GitLab SAST, Azure DevOps | Yesv2.1.0, --format sarif | YesModel scanning only | No | No | No |
| Threat Framework Mapping MITRE ATLAS, OWASP LLM, OWASP Agentic | YesAll three frameworks | YesMITRE ATLAS | YesOWASP, MITRE, NIST | No | YesOWASP, MITRE, NIST |
| Remote Endpoint Trust Scoring TLS, publisher, CVE tracking for MCP endpoints | YesAI research agent | No | PartialAllowlist/blocklist | No | PartialRisk scoring |
| Deployment & Integration | |||||
| Single Binary CLI curl | sh install, works without cloud dependency | YesGo binary, offline-capable | NoEnterprise SaaS | NoEnterprise SaaS | NoEnterprise SaaS | NoEnterprise SaaS |
| Works Offline / Local-First Scanning and enforcement without cloud connectivity | YesCloud enriches, not required | No | No | No | No |
| Multi-Agent Support Claude Code, Cursor, Copilot, any CLI-based agent | YesAgent-aware enforcement | Partial | YesSaaS + endpoint | PartialSaaS agents only | Yes |
One curl command. Linux (macOS coming soon).
mcpctl scan @anthropic/mcp-server-slack analyzes any MCP server, skill, or plugin for vulnerabilities, secrets, and risky tool definitions. Use --format sarif to feed results directly into your CI/CD pipeline.
Security policies decide pass/fail. Passing artifacts are automatically added to your Claude Code config. Failing ones are blocked.
mcpctl agent start runs continuously, watching for changes and sending alerts to Slack, PagerDuty, or webhooks.
Claude Code, Cursor, VS Code
Scan, enforce, monitor
npm, git, containers
Risk scoring, thresholds, categories
Block dangerous commands
Audit LogTLS, publisher, CVE tracking
Multi-turn investigation
Trust scores, inventory
Truvant supports any OIDC-compliant identity provider for organization authentication.
One command to install. Authenticate when you're ready.
curl -fsSL https://truvant.ai/install.sh | sh