feat: add ATR agent threat scanning MCP server#28
Open
eeee2345 wants to merge 2 commits intoFuzzingLabs:masterfrom
Open
feat: add ATR agent threat scanning MCP server#28eeee2345 wants to merge 2 commits intoFuzzingLabs:masterfrom
eeee2345 wants to merge 2 commits intoFuzzingLabs:masterfrom
Conversation
added 2 commits
April 9, 2026 17:52
Add atr-mcp server providing regex-based AI agent threat detection: - atr_scan_text: Scan text against 20 ATR rules - atr_scan_mcp_config: Scan full MCP config for threats - atr_list_rules: List loaded detection rules - atr_rule_info: Get rule details Pure Python, no external binary dependencies, <5ms per scan. Source: https://github.com/anthropics/agent-threat-rules (MIT)
…xt-aware filtering - Remove unused pydantic-settings dependency - Add SKILL_CONTEXT_DENYLIST for context-aware rule filtering - Skip credential scanning on env var values in MCP config scan - Fix Dockerfile to match project template (EXPOSE, PYTHONUNBUFFERED, vendor label) - Deduplicate findings by rule_id per scan - Fix double-scanning in atr_scan_mcp_config - Fix redundant exception handling - Document 20-rule subset in README - Fix README example output accuracy - Fix README source URL with community attribution - Remove context enum constraint for free-form string
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Add an ATR (Agent Threat Rules) MCP server for regex-based AI agent threat detection. Unlike other servers in this hub that wrap external binaries, this server is pure Python with zero external tool dependencies.
Tools
atr_scan_textskillmode excludes high-FP rules).atr_scan_mcp_configatr_list_rulesatr_rule_infoThreat categories covered (20 rules)
Prompt injection (3), jailbreak (2), system prompt override/extraction (2), tool poisoning (2), data exfiltration (2), reverse shell (1), credential exposure (1), privilege escalation (1), cross-agent manipulation (1), hidden instructions (1), social engineering (1), path traversal (1), code injection (1), encoded payload (1).
This is a curated subset of 20 high-precision rules from the ATR standard (108 rules total, MIT licensed).
Files
agent-security/atr-mcp/server.pyagent-security/atr-mcp/rules.jsonagent-security/atr-mcp/Dockerfileagent-security/atr-mcp/README.mdagent-security/atr-mcp/requirements.txtdocker-compose.ymltests/test_mcp_servers.pyexamples/claude-desktop-config.jsonKey design choices
context="skill"excludes 4 high-FP rules for SKILL.md contentread_only: trueDocker filesystem, 256M memory limitTest plan
@app.list_tools()test_mcp_servers.pyparametrized tests