What You’ll Learn
- How to install Golf Scanner
- How to audit your MCP servers with a single command
- How to interpret risk scores and findings
- How to use JSON output for CI/CD pipelines
Prerequisites
- macOS or Linux
- Homebrew (recommended) or Go 1.23+
Install Golf Scanner
- Homebrew (recommended)
- Go Install
- Binary Download
golf-scanner v0.1.0.Run a Security Audit
Run the audit command — it discovers all MCP servers configured across your IDEs and checks each one against 20 security checks:Golf Scanner finds configuration files for Claude Code, Cursor, VS Code, Windsurf, Gemini CLI, Kiro, and Antigravity, then runs security checksCheckpoint: You see a summary table with scores and severity counts for each server.
Read the Results
The audit output shows:For just the summary table:Checkpoint: You can identify which servers need attention based on their score and severity.
- Score: 0–100 risk score (higher is better). Hard-capped at 30 for critical findings, 59 for high findings.
- Risk level: Low (≥60), Moderate (>30), or High (≤30)
- Severity counts: Number of critical, high, medium, and pass findings per server