panavinsingh/MCP-Lattice

Security scanner for Model Context Protocol (MCP) with capability graph analysis. Detects emergent attack chains across multi-server AI agent deployments that no individual tool scan can find.

42
/ 100
Emerging

Built in Go, it auto-discovers MCP configurations across Claude Desktop, Cursor, Windsurf, VS Code, and Gemini CLI, then runs a 4-layer detection pipeline (pattern matching, semantic analysis, capability graph modeling, and LLM-based causal analysis) with 34 YAML-based detection templates covering prompt injection, tool poisoning, SSRF, and auth bypass. The core innovation is cross-server attack chain detection—modeling read/write/execute/transmit capabilities across all configured servers to identify toxic tool combinations no single-server scanner catches, with results exportable to terminal, JSON, SARIF, and HTML formats.

No Package No Dependents
Maintenance 13 / 25
Adoption 4 / 25
Maturity 9 / 25
Community 16 / 25

How are scores calculated?

Stars

7

Forks

6

Language

Go

License

Apache-2.0

Last pushed

Mar 26, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/panavinsingh/MCP-Lattice"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.