Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@ZugaShieldscan this user prompt for injection: 'Ignore all previous instructions'"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
65% of organizations deploying AI agents have no security defense layer. ZugaShield is a production-tested, open-source library that protects your AI agents with:
Zero dependencies — works out of the box, no C extensions
< 15ms overhead — compiled regex fast path, async throughout
150+ signatures — curated threat catalog, updated regularly
MCP-aware — scans tool definitions for hidden injection payloads
7 defense layers — defense in depth, not a single point of failure
Quick Start
Architecture
ZugaShield uses layered defense — every input and output passes through multiple independent detection engines. If one layer misses an attack, the next one catches it.
What It Detects
Attack | How | Layer |
Direct prompt injection | Compiled regex + 150+ catalog signatures | 2 |
Indirect injection | Spotlighting + content analysis | 2 |
Unicode smuggling | Homoglyph + invisible character detection | 2 |
Encoding evasion | Nested base64 / hex / ROT13 decoding | 2 |
Context window flooding | Repetition + token count analysis | 2 |
Few-shot poisoning | Role label density analysis | 2 |
GlitchMiner tokens | Shannon entropy per word | 2 |
Document embedding | CSS hiding patterns (font-size:0, display:none) | 2 |
ASCII art bypass | Entropy analysis + special char density | 2 |
Multi-turn crescendo | Session escalation tracking | 2 |
SSRF / command injection | URL + command pattern matching | 3 |
Path traversal | Sensitive path + symlink detection | 3 |
Memory poisoning | Write + read path validation | 4 |
RAG document injection | Pre-ingestion imperative detection | 4 |
Secret / PII leakage | 70+ secret patterns + PII regex | 5 |
Canary token leaks | Session-specific honeypot tokens | 5 |
DNS exfiltration | Subdomain depth / entropy analysis | 5 |
Image-based injection | EXIF + alt-text + OCR scanning | Multi |
MCP tool poisoning | Tool definition injection scan | Cross |
Behavioral anomaly | Cross-layer event correlation | 6 |
Crypto wallet attacks | Address + amount + function validation | 7 |
MCP Server
ZugaShield ships with an MCP server so Claude, GPT, and other AI platforms can call it as a tool:
Add to your MCP config (claude_desktop_config.json or similar):
9 tools available:
Tool | Description |
| Check user messages for prompt injection |
| Check LLM responses for data leakage |
| Validate tool parameters before execution |
| Scan tool schemas for hidden payloads |
| Check memory writes for poisoning |
| Pre-ingestion RAG document scanning |
| Get current threat statistics |
| View active configuration |
| Toggle layers and settings at runtime |
FastAPI Integration
This gives you a live dashboard with these endpoints:
Endpoint | Description |
| Shield health + layer statistics |
| Recent security events |
| Active configuration |
| Threat signature statistics |
Human-in-the-Loop
Plug in your own approval flow (Slack, email, custom UI) for high-risk decisions:
Configuration
All settings via environment variables — no config files needed:
Variable | Default | Description |
|
| Master on/off toggle |
|
| Block on medium-confidence threats |
|
| Prompt injection defense |
|
| Tool call validation |
|
| Memory write/read scanning |
|
| Output DLP |
|
| Crypto transaction checks |
|
| LLM deep analysis (requires |
|
| Comma-separated sensitive paths |
Optional Extras
Contributing
See CONTRIBUTING.md for development setup and guidelines.
Security
Found a vulnerability? See SECURITY.md for responsible disclosure.
License
MIT — see LICENSE for details.