Best OWASP MCP Servers
The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software through community-led open source software projects, hundreds of chapters worldwide, tens of thousands of members, and by hosting local and global conferences.
Why this server?
Provides comprehensive coverage of OWASP ASI01-ASI10 security requirements for AI systems as part of SINT's security framework for physical AI.
AlicenseAqualityCmaintenanceSecurity-enforcing MCP proxy that sits between an AI agent and any number of downstream MCP servers, intercepting every tool call through a capability-token policy gateway that can allow, deny, or escalate to human approval before the call reaches any real tool. It also exposes built-in operator tools for approval workflows, audit trail queries, token management, voice/HUD output, and hierarchicalLast updated12214Why this server?
Implements OWASP-aligned security checks through the test_security tool to validate authentication flows against security standards.
AlicenseBqualityBmaintenanceEnables enterprise-grade authentication management with secure credential handling and support for multi-protocol auth, complete with tools for analyzing, setting up, and testing authentication systems.Last updated841AGPL 3.0Why this server?
Provides comprehensive access to OWASP security documentation, including detailed information on the OWASP Top 10 vulnerabilities and security cheat sheets.
AlicenseAqualityCmaintenanceProvides instant access to authoritative security documentation from organizations like OWASP, NIST, and major cloud providers through natural language semantic search. It enables users to retrieve security best practices, frameworks, and vulnerability information directly from a locally cached knowledge base.Last updated41MITWhy this server?
Supports implementation of protection against OWASP top 10 vulnerabilities through rule creation and configuration.
AlicenseBqualityCmaintenanceProvides seamless integration with Fastly's Next-Gen Web Application Firewall API, enabling AI assistants to manage web application security through natural language interactions.Last updated291Why this server?
Integrates OWASP security guidelines and references for vulnerability classifications and remediation advice, mapping detected issues to OWASP Top 10 categories.
AlicenseAqualityCmaintenanceA security-focused server that integrates with Cursor IDE to provide real-time vulnerability detection, exploit generation, and security insights during software development.Last updated71MITWhy this server?
Implements OWASP-aligned security checks for authentication systems, allowing validation against industry-standard security practices
AlicenseBqualityCmaintenanceEnterprise-grade authentication solution that provides secure credential management with encryption, multi-protocol authentication (OAuth2, SAML, LDAP), and real-time threat detection for applications.Last updated81AGPL 3.0Why this server?
Conducts security audits and vulnerability scanning with OWASP compliance checking
AlicenseBquality-maintenanceHoutini LM - LM Studio MCP Server with Expert Prompt Library and Custom Prompting - Offload tasks to LM Studio from Claude Desktop.Last updated3427771Why this server?
Provides comprehensive integration with OWASP ZAP for automated web crawling (spider scans), active vulnerability scanning, proxy integration, alert management, and security context configuration.
AlicenseBqualityCmaintenanceAI-powered bug bounty hunting platform that integrates security tools (OWASP ZAP, Caido, Burp Suite) for automated reconnaissance, vulnerability testing, JavaScript analysis, and finding management with PostgreSQL storage.Last updated4728MITWhy this server?
Maps detected security findings to OWASP categories and standards to provide industry-standard vulnerability context.
AlicenseAqualityCmaintenanceAn AI-powered security audit tool that analyzes codebases for vulnerabilities using real-time MITRE CWE data and npm audit. It enables users to perform comprehensive scans for authentication issues, exposed secrets, and dependency risks with structured remediation steps.Last updated22