Scanning & Analysis

Truvant scans AI agent extensions for security issues before they can cause harm. Scanning works locally — your code never leaves your machine.

Why this matters (LLM06:2025) Scanning reveals the scope of agency your AI tools have been granted — every tool schema, every permission, every dependency. You can't enforce least-privilege without first understanding what privileges exist.

What Gets Scanned

Truvant performs deep analysis across the full surface area of your AI agent environment. Each scan type targets a distinct class of risk:

Scan Commands

Scan all local configs

The default mcpctl scan command discovers and scans all MCP servers configured on your machine.

# Scan all locally configured MCP servers (Claude Desktop, Claude Code, etc.)
mcpctl scan

# Scan a specific project directory for MCP configs
mcpctl scan ~/projects

# Scan without importing results into the artifact catalog
mcpctl scan --no-import

Scan a specific artifact

You can target a single artifact by package name, Git URL, or local path for a deep scan without modifying your configs.

# Scan an npm-hosted MCP server package
mcpctl scan @anthropic/mcp-server-filesystem

# Scan a git repository
mcpctl scan github.com/example/my-mcp-server

# Run a deep scan with extended analysis (slower, more thorough)
mcpctl scan --deep @anthropic/mcp-server-everything

Output formats

Scan results can be written in multiple formats for integration with CI pipelines and SIEM tools.

# Default human-readable output to stdout
mcpctl scan

# JSON output for programmatic consumption
mcpctl scan --json

# SARIF format for import into GitHub Code Scanning, VS Code, or any SARIF viewer
mcpctl scan --format sarif -o results.sarif

Artifact Catalog

The Artifact Catalog lists every MCP server, plugin, and package that Truvant has encountered across your fleet. Artifacts are split into two views: Installed (currently active in a host's MCP config) and Discovered (detected but not yet installed, such as packages referenced by configs on other hosts or found during deep scans).

Filter the catalog using any combination of the following:

Artifact Catalog showing installed artifacts with risk scores and analysis status badges
Artifact Catalog — installed artifacts with risk scores and analysis status
Discovered artifacts view showing remote MCP endpoints and packages detected but not yet installed
Discovered artifacts — remote MCP endpoints and packages detected but not yet installed

Artifact Detail

Click any artifact in the catalog to open its detail view. This is the primary interface for understanding the full security profile of an individual MCP server or plugin.

Overview

Expandable sections

Artifact detail view showing risk score badge, version history timeline, AI-generated analysis summary, tools list, and CVE findings
Artifact detail — risk score, version history, AI analysis, tools, vulnerabilities

Skills Analysis

Claude Code plugins can expose multiple skills — individual scripts or hook handlers that execute in response to agent actions. The Skills tab on an artifact detail page breaks down the risk profile of each skill independently, rather than rolling everything into a single artifact-level score.

The Skills tab lists each skill with the following columns:

Column Description
Name The skill identifier as declared in the plugin manifest.
Risk Per-skill risk rating based on static analysis of the skill's source, the permissions it requests, and any secrets or dangerous patterns found within it.
Status Whether the skill is currently Active, Pending Analysis, or Blocked by policy.
Last Analyzed Timestamp of the most recent analysis run for this skill. Skills are re-analyzed when the parent plugin version changes or when manually triggered.
Skills analysis tab showing per-skill risk breakdown with name, risk rating, status, and last analyzed timestamp
Skills analysis — per-skill risk breakdown within a plugin

Trust Scoring for Remote Endpoints

For MCP servers accessed over the network (remote endpoints such as mcp.slack.com or a self-hosted API), Truvant queries the Trust Intelligence Service to compute a trust score before allowing the endpoint to be used by an agent. This score is separate from the local scan risk score and evaluates the endpoint's standing as a remote service.

Trust scoring for remote endpoints evaluates the following signals:

The trust score is used by the policy engine to enforce the risk threshold you configure in your policy role. Endpoints scoring below your threshold are blocked automatically, even if the host is in Monitor mode.

Service availability does not block the CLI If the Trust Intelligence Service is unreachable, Truvant falls back to a cached score or applies your configured fallback policy. The CLI continues to function and local scanning is unaffected.