policylayer 0.1.0 → 0.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/README.md +81 -0
  2. package/package.json +1 -1
package/README.md ADDED
@@ -0,0 +1,81 @@
1
+ # policylayer
2
+
3
+ Scan your MCP config. See what your AI agent can do. Get a shareable report.
4
+
5
+ ## Quick start
6
+
7
+ ```bash
8
+ npx -y policylayer scan
9
+ ```
10
+
11
+ That's it. The CLI finds your MCP config, analyses it against 115+ known servers, and prints a report URL.
12
+
13
+ ## What it does
14
+
15
+ 1. **Finds your config** -- checks `.mcp.json`, `~/.claude.json`, Claude Desktop, Cursor, VS Code, Windsurf, and Codex configs automatically
16
+ 2. **Strips secrets** -- only server names and package identifiers are sent. API keys, tokens, env vars, and file paths are removed before anything leaves your machine
17
+ 3. **Sends to the scan API** -- analyses your servers against a database of 2,500+ tools with severity classifications
18
+ 4. **Prints a report URL** -- permanent, shareable, no login required
19
+
20
+ ## Commands
21
+
22
+ ### `policylayer scan`
23
+
24
+ Scan your MCP configuration.
25
+
26
+ ```bash
27
+ npx -y policylayer scan
28
+ ```
29
+
30
+ **Options:**
31
+
32
+ | Flag | Description |
33
+ |------|-------------|
34
+ | `--config <path>` | Path to a specific config file (skips auto-detection) |
35
+ | `--dry-run` | Show the stripped payload without sending it |
36
+
37
+ ### Examples
38
+
39
+ ```bash
40
+ # Auto-detect config and scan
41
+ npx -y policylayer scan
42
+
43
+ # Scan a specific config file
44
+ npx -y policylayer scan --config .mcp.json
45
+
46
+ # See what would be sent (nothing leaves your machine)
47
+ npx -y policylayer scan --dry-run
48
+ ```
49
+
50
+ ## Config detection
51
+
52
+ The CLI searches these paths in order and uses the first one found:
53
+
54
+ | Client | Path |
55
+ |--------|------|
56
+ | Claude Code (project) | `.mcp.json` |
57
+ | Claude Code (user) | `~/.claude.json` |
58
+ | Claude Desktop | `~/Library/Application Support/Claude/claude_desktop_config.json` |
59
+ | Cursor | `.cursor/mcp.json` |
60
+ | VS Code | `.vscode/settings.json` |
61
+ | Windsurf | `~/.codeium/windsurf/mcp_config.json` |
62
+ | Codex (project) | `.codex/config.toml` |
63
+ | Codex (user) | `~/.codex/config.toml` |
64
+
65
+ ## Privacy
66
+
67
+ The CLI **never sends** your raw config. Before anything leaves your machine:
68
+
69
+ - Environment variables are stripped
70
+ - Auth tokens (`sk-`, `ghp_`, `ict_`, Bearer tokens, etc.) are removed
71
+ - Absolute file paths are removed
72
+ - Command flags are removed
73
+ - Only server names and npm package identifiers are sent
74
+
75
+ Use `--dry-run` to see exactly what would be sent.
76
+
77
+ ## Links
78
+
79
+ - [Example report](https://policylayer.com/scan/report/65545482-5d1d-472f-9fca-472ff1181d0d)
80
+ - [Scan your config online](https://policylayer.com/scan)
81
+ - [Intercept](https://github.com/policylayer/intercept) -- enforce limits on every MCP tool call
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "policylayer",
3
- "version": "0.1.0",
3
+ "version": "0.1.2",
4
4
  "type": "module",
5
5
  "description": "Scan your MCP config for security risks",
6
6
  "bin": {