guardvibe_doctor
Scan MCP configurations, hooks, and environment variables to detect injection attacks, base URL hijacks, and supply chain vulnerabilities. Generates security audit reports with trust verdicts, confidence scores, and allowlist support for project or host scope.
Instructions
Comprehensive AI host security audit. Scans MCP configurations, hooks, environment variables, shell profiles, and permissions for known attack vectors (CVE-2025-59536 hook injection, CVE-2026-21852 base URL hijack, tool result injection, supply chain attacks). Reports trust state, verdict, and confidence for each finding. Supports allowlists via .guardviberc. Use scope=project (default) for project-only scan, scope=host to include shell profiles and global configs.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| path | No | Project root directory | . |
| scope | No | Scan scope: project (default, .claude.json + .cursor/ + .vscode/ + .env), host (+ shell profiles + global MCP configs), full (+ home dir configs) | project |
| format | No | Output format: markdown (human) or json (machine-readable) | markdown |