Skip to main content
Golf Inventory runs 36 security checks against each MCP server. This is a superset of the 20 checks in the OSS Scanner, with 16 additional platform-specific checks.
Check IDNameDescription
type.detectionServer TypeClassifies the server as package manager, container, binary, script, or HTTP. All other checks depend on its output.
universal.command_sanitizationCommand SafetyDetects dangerous patterns in command and args: privilege escalation, shell injection, network downloads, dynamic code execution, and temp path usage.
universal.credential_detectionCredentialsFinds plaintext credentials in args, URLs, and environment variables — AWS keys, GitHub/Stripe/Anthropic/OpenAI tokens, JWTs, URL credentials, and sensitive env var names.
universal.registry.verificationRegistry ListingChecks whether the server is listed in the official MCP Registry.
universal.github.trustGitHub TrustEvaluates trust signals — archived status, last activity, license, stars, contributor count. Cross-validates repo URLs across sources.
universal.tool_description_injectionTool Description InjectionAnalyzes tool descriptions and input schemas for prompt injection patterns: prompt overrides, data exfiltration, cross-tool manipulation, obfuscation. Platform only.
universal.description_changeDescription Change DetectionTrust-on-first-use (TOFU) system that baselines tool description hashes and flags changes on subsequent scans to detect rug-pull attacks. Platform only.
script.locationScript LocationFlags scripts running from unsafe locations like /tmp or home directories.
script.permissionsScript PermissionsDetects world-writable scripts.
binary.locationBinary LocationEvaluates binary path safety — system paths, /opt, home dirs, temp dirs, and unknown locations.
binary.permissionsBinary PermissionsDetects world-writable or group-writable binaries.
container.isolationContainer IsolationFlags --privileged mode, dangerous capabilities (SYS_ADMIN), host namespace sharing, missing --cap-drop, and writable filesystems.
container.volumesContainer VolumesFlags dangerous volume mounts — root filesystem, /etc, Docker socket, SSH keys, cloud credentials, and kube config.
container.imageContainer ImageChecks whether images use digest pinning (@sha256:) vs mutable tags. Looks for Sigstore attestations.
container.registry.existenceContainer RegistryVerifies the container image exists in its OCI registry. Flags digest mismatches as possible tampering.
container.registry.signatureContainer SignatureChecks whether the image has a cosign signature with keyless/Fulcio certificates.
package.vulnerabilityVulnerabilitiesQueries OSV.dev for known CVEs and malware in npm/PyPI packages. Severity mapped from CVSS score.
package.typosquattingTyposquattingDetects similarly-named packages that could indicate a typosquatting attack.
package.distributionDistributionEvaluates package adoption — download counts and package age.
package.repositorySource RepositoryChecks whether the package links to a source repository. Cross-checks npm, PyPI, deps.dev, and MCP Registry.
package.unscoped_variantUnscoped VariantFor scoped npm packages (@scope/pkg): checks if the unscoped variant has known malware or vulnerabilities.
package.sandbox.analysisSandbox AnalysisExecutes server source code in an isolated cloud sandbox. Analyzes dependencies, external domains, secrets, and overall risk profile. Platform only.
package.sandbox.secretsSandbox SecretsSurfaces credentials found in source code during sandbox analysis. Platform only.
package.sandbox.dependenciesSandbox DependenciesReports the dependency count discovered during sandbox analysis. Platform only.
package.sandbox.external_communicationExternal CommunicationDetects external domains the server communicates with. Compares against an allowlist of expected registries. Platform only.
capability.server_analysisServer Capability AnalysisSends all server capabilities (tools, prompts, resources) for holistic risk assessment. Produces per-tool assessments and seven risk category findings. Platform only.
capability.destructive_toolsDestructive ToolsTools that can delete, destroy, or corrupt data. Platform only.
capability.open_world_accessOpen World AccessTools with unrestricted external access. Platform only.
capability.sensitive_dataSensitive Data AccessTools accessing credentials, PII, or financial data. Platform only.
capability.code_executionCode ExecutionTools executing arbitrary code or shell commands. Platform only.
capability.write_operationsWrite OperationsNon-idempotent state changes. Platform only.
capability.broad_scopeBroad ScopeOver-privileged tools with excessively wide permissions. Platform only.
capability.toxic_combinationsToxic CombinationsDangerous combinations of capabilities (e.g., read secrets + external network access). Platform only.
gateway.assignmentGateway AssignmentVerifies whether HTTP/SSE servers are routed through a Golf Gateway. Platform only.
runtime.environmentRuntime EnvironmentSurfaces runtime probe metadata — credential requirements, transport type, protocol version, and server info. Platform only.
http.oauthOAuthFor public HTTP/SSE servers: discovers OAuth/OIDC configuration. Flags missing authentication and HTTP-only endpoints.
The first 20 checks are identical to the OSS Scanner. See Scanner Security Checks for detailed checklist IDs and severity breakdowns.