@bryan-thompson/inspector-assessment-cli 1.23.8 → 1.23.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1010,9 +1010,10 @@ Module Selection:
1010
1010
  Valid module names:
1011
1011
  functionality, security, documentation, errorHandling, usability,
1012
1012
  mcpSpecCompliance, aupCompliance, toolAnnotations, prohibitedLibraries,
1013
- manifestValidation, portability, temporal, resources, prompts, crossCapability
1013
+ externalAPIScanner, authentication, temporal, resources, prompts,
1014
+ crossCapability, manifestValidation, portability
1014
1015
 
1015
- Assessment Modules (16 total):
1016
+ Assessment Modules (17 total):
1016
1017
  • Functionality - Tests all tools work correctly
1017
1018
  • Security - Prompt injection & vulnerability testing
1018
1019
  • Documentation - README completeness checks
@@ -1022,9 +1023,14 @@ Assessment Modules (16 total):
1022
1023
  • AUP Compliance - Acceptable Use Policy checks
1023
1024
  • Tool Annotations - readOnlyHint/destructiveHint validation
1024
1025
  • Prohibited Libs - Dependency security checks
1025
- Manifest - MCPB manifest.json validation
1026
- Portability - Cross-platform compatibility
1026
+ External API - External service detection
1027
+ Authentication - OAuth/auth evaluation
1027
1028
  • Temporal - Rug pull/temporal behavior change detection
1029
+ • Resources - Resource capability assessment
1030
+ • Prompts - Prompt capability assessment
1031
+ • Cross-Capability - Chained vulnerability detection
1032
+ • Manifest - MCPB manifest.json validation (optional)
1033
+ • Portability - Cross-platform compatibility (optional)
1028
1034
 
1029
1035
  Examples:
1030
1036
  mcp-assess-full my-server
@@ -256,7 +256,7 @@ async function runSecurityAssessment(options) {
256
256
  callTool: createCallToolWrapper(client),
257
257
  config,
258
258
  };
259
- console.log(`🛡️ Running security assessment with 17 attack patterns...`);
259
+ console.log(`🛡️ Running security assessment with 23 attack patterns...`);
260
260
  const assessor = new SecurityAssessor(config);
261
261
  const results = await assessor.assess(context);
262
262
  await client.close();
@@ -372,7 +372,7 @@ function printHelp() {
372
372
  console.log(`
373
373
  Usage: mcp-assess-security [options] [server-name]
374
374
 
375
- Run security assessment against an MCP server with 17 attack patterns.
375
+ Run security assessment against an MCP server with 23 attack patterns.
376
376
 
377
377
  Options:
378
378
  --server, -s <name> Server name (required, or pass as first positional arg)
@@ -382,14 +382,11 @@ Options:
382
382
  --verbose, -v Enable verbose logging
383
383
  --help, -h Show this help message
384
384
 
385
- Attack Patterns Tested (17 total):
386
- Direct prompt injection
387
- Indirect prompt injection
388
- Instruction override
389
- Role-playing attacks
390
- • Encoding bypass
391
- • Multi-turn manipulation
392
- • Context poisoning
385
+ Attack Patterns Tested (23 total):
386
+ Command Injection, SQL Injection, Path Traversal
387
+ Calculator Injection, Code Execution, XXE
388
+ Data Exfiltration, Token Theft, NoSQL Injection
389
+ Unicode Bypass, Nested Injection, Package Squatting
393
390
  • And more...
394
391
 
395
392
  Examples:
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@bryan-thompson/inspector-assessment-cli",
3
- "version": "1.23.8",
3
+ "version": "1.23.9",
4
4
  "description": "CLI for the Enhanced MCP Inspector with assessment capabilities",
5
5
  "license": "MIT",
6
6
  "author": "Bryan Thompson <bryan@triepod.ai>",