guardvibe_doctor
Scan project and host configurations for AI security risks including MCP config hijacking, base URL hijacking, and exposed environment variables.
Instructions
Check AI host security: MCP configurations, hooks, base URL hijacking, environment variable exposure. NOT the same as audit_config which checks application config files (next.config, .env, headers). Use scope=project (default) for project-only, scope=host to include shell profiles and global AI configs. Example: guardvibe_doctor({scope: 'project'})
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| path | No | Project root directory | . |
| scope | No | Scan scope: project (default, .claude.json + .cursor/ + .vscode/ + .env), host (+ shell profiles + global MCP configs), full (+ home dir configs) | project |
| format | No | Output format: markdown (human) or json (machine-readable) | markdown |