Is this MCP server safe?
MCPAmpel scans any GitHub, GitLab, npm or PyPI URL through 16 independent security engines. Sandboxed in Docker. One trust score. No account required.
From a URL to a trust score, in three steps.
Submit any URL
GitHub, GitLab, npm or PyPI. Packages resolve to source repos automatically. We shallow-clone into a fresh sandbox — never your machine.
16 engines, in parallel
Semgrep, Bandit, Trivy, Grype, Gitleaks, OSV-Scanner, Cisco MCP and more — each in its own Docker container, three concurrent. Live progress streams via SSE.
One score. Every finding.
Weighted aggregation from 0.0 to 10.0. Red, amber, green like a real Ampel. Drill into per-engine findings, export NIS2 PDF or CycloneDX SBOM.
Sixteen scanners. One verdict.
What's been scanned this hour.
Distribution · last 24h
Top finding · today
Hardcoded API key in config.py
Detected by Gitleaks across 4 different MCP servers in the last 24 hours.
Drop a badge in your README. Build trust before anyone clicks Install.
Every public scan gets an SVG badge. Free badges go grey after 30 days; monitored repos auto-refresh and pulse green when fresh. Add it once — it stays current.
USED BY → modelcontextprotocol · cloudflare · chroma · fastmcp · 4,200+ public repos
Things people ask first.
Red, amber, or green —
find out in 60 seconds.
Paste a URL. No account. No payment. No retention of source.