bawbel-mcp
Bawbel MCP Server
Security scanner for MCP servers and agentic AI components, exposed as MCP tools.
Bawbel MCP Server lets any MCP-compatible agent scan servers, check skill files, score conformance, and query the AVE threat intelligence database mid-conversation.
Install
pip install bawbel-mcpOr with all detection engines (YARA, Semgrep, LLM, Magika):
pip install "bawbel-mcp[all]"Tools
Tool | Description |
| Scan raw text content for AVE vulnerabilities |
| Fetch and scan an MCP server-card before connecting |
| Score a server manifest against the MCP spec (18 checks, A+ to F) |
| Get a full AVE record by ID with remediation guidance |
| Search AVE records by keyword |
| List all AVE records with optional severity/category filters |
| Detect rug pull drift in a directory of skill files |
Resources
Resource | Description |
| Current AVE database statistics |
| Full AVE record for a specific ID |
Usage
Claude Desktop
Add to claude_desktop_config.json:
{
"mcpServers": {
"bawbel": {
"command": "uvx",
"args": ["bawbel-mcp"]
}
}
}Claude Code
claude mcp add bawbel uvx bawbel-mcpCursor / Windsurf
Add to your MCP settings:
{
"bawbel": {
"command": "uvx",
"args": ["bawbel-mcp"]
}
}Remote deployment (Streamable HTTP)
uvx bawbel-mcp --transport streamable-http --host 0.0.0.0 --port 8000Example conversations
Scan a server before connecting:
"Before I add this MCP server to my config, scan it for security issues: https://api.some-mcp-server.com"
Claude calls scan_server_card("https://api.some-mcp-server.com") and reports any
findings with AVE IDs, severity, and remediation steps.
Check a skill file:
"Check this skill file content for prompt injection vulnerabilities: [paste content]"
Claude calls scan_content(content) and returns findings.
Score a server against the spec:
"Does this server follow the MCP spec? https://api.some-mcp-server.com"
Claude calls check_conformance("https://api.some-mcp-server.com") and returns
a score, grade, and list of failed checks.
Look up a vulnerability:
"What is AVE-2026-00041 and how do I fix it?"
Claude calls lookup_ave("AVE-2026-00041") and returns the full record with
behavioral fingerprint, IOCs, and remediation steps.
Search for relevant vulnerabilities:
"What AVE records cover credential exfiltration?"
Claude calls search_ave("credential exfiltration") and returns matching records.
Requirements
Python 3.10+
bawbel-scanner>=1.1.1(installed automatically)fastmcp>=3.0.0(installed automatically)
The bawbel CLI must be available in PATH. Installing bawbel-mcp installs
bawbel-scanner which provides the bawbel CLI.
Related
bawbel-scanner — CLI scanner
bawbel-ave — AVE standard and records
api.piranha.bawbel.io — Threat intel API
bawbel.io/docs — Full documentation
Apache 2.0. Built by Bawbel.
This server cannot be installed
Maintenance
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/bawbel/bawbel-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server