You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* change v0 -> v0.1
* v0 -> v0.1 doc and test changes
* using a constant variable
* api version to the improt script
* removed version from readme.md
* replace v0 to ANTHROPIC_API_VERSION in md
* fixed the syntax error
* changed name back to v0
* reverting release notes change
* changed v0.1 to {ANTHROPIC_API_VERSION}
* move v0.1 -> v0
* v0.1 -> v0
* more updates for uniformity
* docker changes
* updated readme.md
* updated docs/anthropic-registry-import.md
* updated anthropic_registry_spi.md
* updated design docs
* changed {REGISTRY_CONSTANTS.ANTHROPIC_API_VERSION} to v0.1 in design docs
* removed date and issue number
* renamed v0_routes -> registry_routes
* renamed test_v0_routes to test_registry_routes
* refactored
* changed import name from v0_router to registry_router
* updates to md file
* changed {{API_VERSION}} to {{{ANTHROPIC_API_VERSION}}
* cisco security scanner
* added llm to default analyzer
* setting MCP_SCANNER_LLM_API_KEY to env variable
* reverting llm change
* both yara and llm
* added #Security scans to gitignore
* checking for placeholder value
* Add security scanning enhancements and workflow improvements
- Add scan_all_servers.py CLI tool for bulk security scanning
- Supports --token and --token-file parameters with priority handling
- Generates comprehensive markdown reports with detailed findings
- Reports saved to security_scans/scan_report.md (latest) and security_scans/reports/ (timestamped archives)
- Masks tokens in logs for security (shows first 20 and last 10 chars)
- Enhance service_mgmt.sh security scan workflow
- Auto-append /mcp to proxy_pass_url if not ending with /mcp or /sse
- Load ADMIN_PASSWORD from .env file for auto-disabling unsafe servers
- Fix authentication header forwarding in auth-server
- Update auth_server/server.py
- Add fallback to check Authorization header if X-Authorization not present
- Explicit priority: X-Authorization > Authorization
- Add mcp_security_scanner.py header support
- Parse --headers argument and extract Bearer token
- Pass token to mcp-scanner via --bearer-token
- Add example configs
- shawndurrani-ai-server-config.json for external MCP server
- Update .gitignore
- Add .roo/ for Roo IDE files
* Update security scanner documentation
Changes:
- Renamed docs/cisco-security-scanner-setup.md to docs/security-scanner.md
- Rewrote documentation to be generic (not Cisco-specific)
- Added MCP Supply Chain Security introduction
- Documented integration with Cisco AI Defence MCP Scanner
- Section 1: Security scanning during server addition
- Command format and examples
- Real config example (cloudflare-docs-server-config.json)
- Real scan output example (docs.mcp.cloudflare.com_mcp.json)
- Explained disabled state and security-pending tag
- Added placeholder for screenshot
- Section 2: Periodic registry scans
- Command examples for scan_all_servers.py
- Report location and structure (security_scans/scan_report.md)
- Reference to scan_report_example.md
- Updated README.md:
- Added security scanning to "What's New" section
- Added "Security Scanning" subsection to Enterprise Features
- Removed unnecessary prerequisites:
- MCP Scanner install (already in pyproject.toml)
- Registry admin credentials (handled by .env)
- Removed redundant troubleshooting section
Files changed:
- docs/cisco-security-scanner-setup.md → docs/security-scanner.md
- README.md (What's New + Enterprise Features sections)
- cli/examples/cloudflare-docs-server-config.json (new example)
- docs/scan_report_example.md (new reference report)
* Fix health checks and tool fetching for Cloudflare and streamable-http servers
This commit fixes multiple issues with health checks and automatic tool discovery:
1. Health Check - Proper MCP Session Management
- Add proper MCP initialize flow to get session ID from server
- Use server-generated session ID for subsequent ping requests
- Skip URL pattern shortcut when supported_transports contains streamable-http
- Handle auth failures during initialize by falling back to ping without auth
2. Tool Fetching - Header and URL Fixes
- Add required Accept header: application/json, text/event-stream
- Remove trailing slash from MCP URLs (Cloudflare rejects it)
- Fix MCP client to properly handle Cloudflare's requirements
3. Tool Auto-Discovery - Enhanced Logic
- Always fetch tools on first health check (previous_status == UNKNOWN)
- Fetch tools when server transitions to healthy
- Fetch tools if server is healthy but has empty tool_list
- Ensures tools populate automatically on startup and registration
4. Import Script - Preserve Transport Type
- Stop removing supported_transports field during import
- Allows SSE servers to be registered with correct transport type
- Fixes health checks for servers like ai.shawndurrani-mcp-merchant
Fixes Cloudflare Documentation MCP Server health checks and tool discovery.
Fixes sre-gateway showing unhealthy when auth token expires.
* Update security scanner documentation with screenshot reference
Replace placeholder text with actual screenshot reference for failed security scan.
Shows how servers that fail security scans are added in disabled state with
security-pending tag.
* Replace specific domain with example.com in security scanner docs
Use mcpgateway.example.com instead of mcpgateway.ddns.net for better
documentation practices with a generic example domain.
* Render example report summary as markdown instead of code block
Remove markdown code block wrapper from example report summary to display
it as rendered markdown for better readability.
* Remove redundant installation note from prerequisites
The statement about MCP Scanner being included in pyproject.toml is
unnecessary in the Prerequisites section.
---------
Co-authored-by: Nisha Deborah Philips <[email protected]>
Co-authored-by: Amit Arora <[email protected]>
Copy file name to clipboardExpand all lines: README.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,6 +82,7 @@ The **MCP Gateway & Registry** is an enterprise-ready platform that centralizes
82
82
83
83
## What's New
84
84
85
+
-**🔒 MCP Server Security Scanning** - Integrated vulnerability scanning with Cisco AI Defence MCP Scanner. Automatic security scans during server registration, periodic registry-wide scans with detailed markdown reports, and automatic disabling of servers with security issues.
85
86
-**📥 Import Servers from Anthropic MCP Registry** - Import curated MCP servers from Anthropic's registry with a single command. [Import Guide](docs/anthropic-registry-import.md)
86
87
-**🔌 Anthropic MCP Registry REST API Compatibility** - Full compatibility with Anthropic's MCP Registry REST API specification. [API Documentation](docs/anthropic_registry_api.md)
@@ -373,6 +374,14 @@ Seamlessly integrate with Anthropic's official MCP Registry to import and access
373
374
374
375
[Import Guide](docs/anthropic-registry-import.md) | [Registry API Documentation](docs/anthropic_registry_api.md)
375
376
377
+
### Security Scanning
378
+
379
+
**Integrated Vulnerability Detection:**
380
+
-**Automated Security Scanning** - Integrated vulnerability scanning for MCP servers using Cisco AI Defence MCP Scanner, with automatic scans during registration and support for periodic registry-wide scans
381
+
-**Detailed Security Reports** - Comprehensive markdown reports with vulnerability details, severity assessments, and remediation recommendations
382
+
-**Automatic Protection** - Servers with security issues are automatically disabled with security-pending status to protect your infrastructure
383
+
-**Compliance Ready** - Security audit trails and vulnerability tracking for enterprise compliance requirements
0 commit comments