AIM Guard MCP
AI-powered security and safety server for Model Context Protocol environments.
Key Features
Use Cases
README
AIM Guard MCP
π‘οΈ AIM MCP Server :: Guard and Protect your MCPs & AI Agents
A Model Context Protocol (MCP) server that provides AI-powered security analysis and safety instruction tools. This server helps protect AI agents by providing security guidelines, content analysis, and cautionary instructions when interacting with various MCPs and external services.
Features
π§ Tools (6 total)
- π‘οΈ AI Safety Guard: Contextual security instructions for MCP interactions
- π Text Guard Analysis: Harmful content detection using AIM Intelligence API
- π Security Prompt Enhancement: Add security layers to user prompts
- π¨ Prompt Injection Detector: OWASP LLM01:2025 compliant injection detection
- π Credential Scanner: Scan for exposed API keys, passwords, tokens, and secrets
- π URL Security Validator: Validate URLs for phishing, malware, and HTTPS enforcement
π Resources (9 total)
- π Security Checklists: MCP-specific security checklists (database, email, slack, file, web, general)
- π Security Policies: Comprehensive policies (data classification, access control, incident response)
π¬ Prompts (2 total)
- π Security Review: Multi-step security review workflow
- β οΈ Threat Analysis: STRIDE-based threat modeling and risk assessment
π― General
- β‘ Fast & Lightweight: Built with TypeScript and Zod validation
- π§ Easy Integration: Works with any MCP-compatible AI assistant
- π API Integration: Connects to AIM Intelligence API for advanced analysis
- π Comprehensive Documentation: Detailed guide for Tools, Resources, and Prompts
Installation
Installing via Smithery
To install aim-mcp for Claude Desktop automatically via Smithery:
npx -y @smithery/cli install @AIM-Intelligence/aim-mcp --client claude
NPX (Recommended)
npx aim-guard-mcp
Global Installation
npm install -g aim-guard-mcp
aim-guard-mcp
Local Installation
npm install aim-guard-mcp
Usage
As MCP Server
Add to your MCP client configuration:
{
"servers": {
"aim-guard": {
"type": "stdio",
"command": "npx",
"args": ["aim-guard-mcp"]
}
}
}
Testing the Tools
Test AI Safety Guard
# Get safety instructions for database operations
{
"name": "ai-safety-guard",
"arguments": {
"mcp_type": "database",
"operation_type": "query",
"sensitivity_level": "confidential"
}
}
Test Text Guard
# This will analyze the text for harmful content
{
"name": "aim-text-guard",
"arguments": {
"text": "This is a sample text to analyze for safety."
}
}
Test Security Prompt Enhancement
# Enhance a user prompt with security instructions
{
"name": "aim-security-prompt-tool",
"arguments": {
"user_prompt": "Please help me with this task",
"security_level": "strict"
}
}
Available Tools
1. ai-safety-guard
Provides contextual security instructions and precautions for AI Agents before they interact with other MCPs.
{
"name": "ai-safety-guard",
"arguments": {
"mcp_type": "email|slack|database|file|web|general",
"operation_type": "read|write|execute|delete|send|query",
"sensitivity_level": "public|internal|confidential|restricted"
}
}
Features: Context-aware guidelines, operation-specific warnings, red flag detection
2. aim-text-guard
Analyze text content for harmful or inappropriate content using AIM Intelligence API.
{
"name": "aim-text-guard",
"arguments": {
"text": "Text content to analyze"
}
}
Features: Real-time analysis, harmful content detection, detailed JSON results
3. aim-security-prompt-tool
Enhance user prompts with security instructions for safer AI interactions.
{
"name": "aim-security-prompt-tool",
"arguments": {
"user_prompt": "Original user prompt",
"security_level": "basic|standard|strict"
}
}
Features: Multi-level enhancement, threat analysis, social engineering protection
4. prompt-injection-detector π
Detect prompt injection attempts based on OWASP LLM01:2025 patterns.
{
"name": "prompt-injection-detector",
"arguments": {
"text": "Text to analyze for injection patterns",
"sensitivity": "low|medium|high"
}
}
Features:
- 15+ injection pattern detection (instruction override, role manipulation, jailbreak attempts)
- Risk scoring (0-100) with severity assessment
- OWASP LLM01:2025 compliant
- Configurable sensitivity levels
- Detailed threat reporting
5. credential-scanner π
Scan text for exposed credentials including API keys, passwords, tokens, and SSH keys.
{
"name": "credential-scanner",
"arguments": {
"text": "Text to scan for credentials",
"mask_findings": true
}
}
Features:
- 50+ credential patterns (AWS, GitHub, Google, OpenAI, Stripe, JWT, SSH keys)
- Automatic credential masking
- Risk level assessment
- Platform-specific detection (AWS, GitHub, Slack, databases)
- Actionable security recommendations
6. url-security-validator π
Validate URL safety for phishing, malware, and security issues.
{
"name": "url-security-validator",
"arguments": {
"url": "URL to validate",
"strict_mode": false
}
}
Features:
- 10+ security checks (protocol, TLD, IP address, homograph attacks)
- Phishing domain detection
- URL shortener identification
- Suspicious parameter detection
- HTTPS enforcement validation
Available Resources π
Resources provide read-only security documentation and policies accessible via URI schemes.
Security Checklists
Access via security-checklist://[type]
security-checklist://database- Database operations checklistsecurity-checklist://email- Email operations checklistsecurity-checklist://slack- Chat/messaging operations checklistsecurity-checklist://file- File operations checklistsecurity-checklist://web- Web request checklistsecurity-checklist://general- General MCP operations checklist
Each checklist includes:
- Pre-operation checks
- During-operation guidelines
- Post-operation verification
- Red flags to abort operations
Security Policies
Access via security-policy://[type]
security-policy://data-classification- Data classification levels and handling requirementssecurity-policy://access-control- Access control principles and authentication requirementssecurity-policy://incident-response- Incident response procedures and severity levels
Available Prompts π
Prompts provide reusable workflow templates for complex security operations.
1. security-review
Comprehensive security review workflow for code, data, or configuration.
{
"name": "security-review",
"arguments": {
"target_type": "code|data|configuration",
"context": "Additional context (optional)"
}
}
Workflow:
- Credential scanning
- Prompt injection detection (if applicable)
- Security checklist consultation
- Policy compliance review
- Threat analysis
- Risk assessment and recommendations
- Summary table - Visual overview of all findings by severity
Summary Output Example:
π μμ½
| μ¬κ°λ | κ°μ | νμΌ/μμΉ |
|-------------|-----|------------------------|
| π΄ CRITICAL | 1 | resources/handler.ts |
| π HIGH | 2 | textGuard.ts |
| π‘ MEDIUM | 3 | prompts/handler.ts |
| π’ LOW | 5 | credentialScanner.ts |
2. threat-analysis
Analyze potential security threats using STRIDE methodology.
{
"name": "threat-analysis",
"arguments": {
"scenario": "Security scenario to analyze",
"sensitivity_level": "public|internal|confidential|restricted"
}
}
Framework:
- Asset identification
- STRIDE threat modeling (Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege)
- Risk assessment (likelihood Γ impact)
- Attack vector analysis
- Control gap identification
- Mitigation strategies
- Compliance considerations
- Incident response planning
- Summary table - Visual overview of all threats by severity
Summary Output Example:
π μμ½
| μ¬κ°λ | κ°μ | μν μ ν |
|-------------|-----|---------------------------------|
| π΄ CRITICAL | 2 | Information Disclosure, Spoofing |
| π HIGH | 1 | Elevation of Privilege |
| π‘ MEDIUM | 3 | Tampering, DoS |
| π’ LOW | 1 | Repudiation |
Security Features
π‘οΈ AI Agent Protection
- MCP Interaction Safety: Contextual guidelines for different MCP types
- Operation Validation: Specific precautions for read/write/execute operations
- Data Sensitivity Handling: Protocols based on data classification levels
π Content Analysis
- Real-time Threat Detection: Analyze content for harmful patterns
- Prompt Injection Detection: OWASP LLM01:2025 compliant pattern matching
- Credential Exposure Prevention: Scan for 50+ types of exposed secrets
- API-powered Analysis: Advanced AI-driven content safety assessment
π URL Security
- Phishing Detection: Identify suspicious domains and homograph attacks
- HTTPS Enforcement: Validate secure protocol usage
- Malicious URL Blocking: Check against known threat indicators
π Policy & Compliance
- Security Checklists: Pre-built checklists for all MCP types
- Data Classification: Clear policies for handling sensitive data
- Access Control: Guidelines for authentication and authorization
- Incident Response: Structured procedures for security incidents
π Workflow Orchestration
- Security Review Prompts: Multi-step review workflows
- Threat Analysis: STRIDE-based threat modeling
- Automated Audits: Combine multiple tools for comprehensive checks
Development
# Clone the repository
git clone https://github.com/AIM-Intelligence/AIM-MCP.git
cd AIM-MCP
# Install dependencies
pnpm install
# Build the project
pnpm run build
# Run in development mode
pnpm run dev
# Run tests
pnpm test
Deployment
This project uses automated CI/CD pipeline for seamless deployment to NPM.
Automatic Deployment
When you push to the main branch, GitHub Actions will automatically:
- Build and Test: Compile TypeScript and run tests
- Version Check: Compare current version with published version
- Publish to NPM: Automatically publish if version has changed
- Create Release: Generate GitHub release with version tag
Manual Version Management
# Bump patch version (1.0.0 -> 1.0.1)
pnpm run release:patch
# Bump minor version (1.0.0 -> 1.1.0)
pnpm run release:minor
# Bump major version (1.0.0 -> 2.0.0)
pnpm run release:major
Setting up NPM Token
To enable automatic deployment, add your NPM token to GitHub Secrets:
- Go to npmjs.com and create an automation token
- In your GitHub repository, go to Settings > Secrets and variables > Actions
- Add a new secret named
NPM_TOKENwith your NPM token value
Deployment Workflow
graph LR
A[Push to main] --> B[GitHub Actions]
B --> C[Build & Test]
C --> D[Version Check]
D --> E{Version Changed?}
E -->|Yes| F[Publish to NPM]
E -->|No| G[Skip Deployment]
F --> H[Create GitHub Release]
F --> I[Create Git Tag]
Contributing
- Fork the repository
- Create your feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add some amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
License
This project is licensed under the ISC License - see the LICENSE file for details.
Documentation
- π MCP Components Guide: Comprehensive guide to Tools, Resources, and Prompts
- π GitHub Wiki: Additional documentation and examples
- π MCP Specification: Official Model Context Protocol documentation
Support
- π§ Email: support@aim-intelligence.com
- π Issues: GitHub Issues
- π¬ Discussions: GitHub Discussions
Made with β€οΈ by AIM Intelligence
Star History
Repository Owner
Organization
Repository Details
Programming Languages
Tags
Join Our Newsletter
Stay updated with the latest AI tools, news, and offers by subscribing to our weekly newsletter.
Related MCPs
Discover similar Model Context Protocol servers
RAD Security MCP Server
AI-powered security insights for Kubernetes and cloud environments via the Model Context Protocol.
RAD Security MCP Server is an implementation of the Model Context Protocol designed to deliver AI-powered security insights and operations for Kubernetes and cloud platforms. It serves as an MCP server for RAD Security, providing a range of toolkits for container, cluster, identity, audit, and threat management. The server is easily configurable via environment variables, allowing for flexible toolkit activation and authentication options. Multiple deployment options are supported, including Node.js, Docker, and integration with development environments like Cursor IDE and Claude Desktop.
- β 5
- MCP
- rad-security/mcp-server
Intruder MCP
Enable AI agents to control Intruder.io via the Model Context Protocol.
Intruder MCP allows AI model clients such as Claude and Cursor to interactively control the Intruder vulnerability scanner through the Model Context Protocol. It can be deployed using smithery, locally with Python, or in a Docker container, requiring only an Intruder API key for secure access. The tool provides integration instructions tailored for MCP-compatible clients, streamlining vulnerability management automation for AI-driven workflows.
- β 21
- MCP
- intruder-io/intruder-mcp
Authenticator App MCP Server
Secure MCP server for AI-assisted access to 2FA codes and passwords.
Authenticator App MCP Server provides a secure Model Context Protocol (MCP) server enabling AI agents to interact with authentication credentials, such as 2FA codes and passwords. It facilitates automated login processes for AI assistants while maintaining robust security by requiring access tokens and integrating with the Authenticator App desktop client. This solution streamlines the management of user credentials across multiple platforms and websites, ensuring seamless and secure credential retrieval by AI agents.
- β 27
- MCP
- firstorderai/authenticator_mcp
Azure MCP Server
Connect AI agents with Azure services through Model Context Protocol.
Azure MCP Server provides a seamless interface between AI agents and Azure services by implementing the Model Context Protocol (MCP) specification. It enables integration with tools like GitHub Copilot for Azure and supports a wide range of Azure resource management tasks directly via conversational AI interfaces. Designed for extensibility and compatibility, it offers enhanced contextual capabilities for agents working with Azure environments.
- β 1,178
- MCP
- Azure/azure-mcp
MCP Server for TheHive
Connect AI-powered automation tools to TheHive incident response platform via MCP.
MCP Server for TheHive enables AI models and automation clients to interact with TheHive incident response platform using the Model Context Protocol. It provides tools to retrieve and analyze security alerts, manage cases, and automate incident response operations. The server facilitates seamless integration by exposing these functionalities over the standardized MCP protocol through stdio communication. It offers both pre-compiled binaries and a source build option with flexible configuration for connecting to TheHive instances.
- β 11
- MCP
- gbrigandi/mcp-server-thehive
CipherTrust Manager MCP Server
Enables AI assistants to access CipherTrust Manager securely via the Model Context Protocol.
CipherTrust Manager MCP Server provides an implementation of the Model Context Protocol (MCP), offering AI assistants such as Claude and Cursor a unified interface to interact with CipherTrust Manager resources. Communication is facilitated through JSON-RPC over stdin/stdout, enabling key management, CTE client management, user management, and connection management functionalities. The tool is configurable via environment variables and integrates with existing CipherTrust Manager instances using the ksctl CLI for secure resource access.
- β 7
- MCP
- sanyambassi/ciphertrust-manager-mcp-server
Didn't find tool you were looking for?