AIM Guard

安全与合规

by AIM-Intelligence

提供 AI 驱动的安全分析与安全指令工具,在 MCP 交互中保护 AI agents;可检测有害或不当文本,并为 prompts 增强安全指引,实现更安全的交互。

什么是 AIM Guard

提供 AI 驱动的安全分析与安全指令工具,在 MCP 交互中保护 AI agents;可检测有害或不当文本,并为 prompts 增强安全指引,实现更安全的交互。

核心功能 (6 个工具)

ai-safety-guard

AI Safety Guard - MCP Caution Instructions for AI Agents

aim-text-guard

AIM-Intelligence Text Guard Tool

aim-security-prompt-tool

Security Prompt Enhancement Tool

prompt-injection-detector

Detect prompt injection attempts based on OWASP LLM01:2025 patterns

credential-scanner

Scan text for exposed credentials (API keys, passwords, tokens, SSH keys)

url-security-validator

Validate URL safety (phishing, malware, HTTPS enforcement)

README

en ko

AIM Guard MCP

Trust Score smithery badge

NPM Version Smithery Server

🛡️ AIM MCP Server :: Guard and Protect your MCPs & AI Agents

A Model Context Protocol (MCP) server that provides AI-powered security analysis and safety instruction tools. This server helps protect AI agents by providing security guidelines, content analysis, and cautionary instructions when interacting with various MCPs and external services.

<a href="https://glama.ai/mcp/servers/@AIM-Intelligence/AIM-MCP"> <img width="380" height="200" src="https://glama.ai/mcp/servers/@AIM-Intelligence/AIM-MCP/badge" alt="AIM-Guard-MCP MCP server" /> </a>

Features

🔧 Tools (6 total)

  • 🛡️ AI Safety Guard: Contextual security instructions for MCP interactions
  • 🔍 Text Guard Analysis: Harmful content detection using AIM Intelligence API
  • 🔒 Security Prompt Enhancement: Add security layers to user prompts
  • 🚨 Prompt Injection Detector: OWASP LLM01:2025 compliant injection detection
  • 🔐 Credential Scanner: Scan for exposed API keys, passwords, tokens, and secrets
  • 🌐 URL Security Validator: Validate URLs for phishing, malware, and HTTPS enforcement

📚 Resources (9 total)

  • 📋 Security Checklists: MCP-specific security checklists (database, email, slack, file, web, general)
  • 📖 Security Policies: Comprehensive policies (data classification, access control, incident response)

💬 Prompts (2 total)

  • 🔍 Security Review: Multi-step security review workflow
  • ⚠️ Threat Analysis: STRIDE-based threat modeling and risk assessment

🎯 General

  • Fast & Lightweight: Built with TypeScript and Zod validation
  • 🔧 Easy Integration: Works with any MCP-compatible AI assistant
  • 🔗 API Integration: Connects to AIM Intelligence API for advanced analysis
  • 📚 Comprehensive Documentation: Detailed guide for Tools, Resources, and Prompts

Installation

Installing via Smithery

To install aim-mcp for Claude Desktop automatically via Smithery:

bash
npx -y @smithery/cli install @AIM-Intelligence/aim-mcp --client claude

NPX (Recommended)

bash
npx aim-guard-mcp

Global Installation

bash
npm install -g aim-guard-mcp
aim-guard-mcp

Local Installation

bash
npm install aim-guard-mcp

Usage

As MCP Server

Add to your MCP client configuration:

json
{
  "servers": {
    "aim-guard": {
      "type": "stdio",
      "command": "npx",
      "args": ["aim-guard-mcp"]
    }
  }
}

Testing the Tools

Test AI Safety Guard

bash
# Get safety instructions for database operations
{
  "name": "ai-safety-guard",
  "arguments": {
    "mcp_type": "database",
    "operation_type": "query",
    "sensitivity_level": "confidential"
  }
}

Test Text Guard

bash
# This will analyze the text for harmful content
{
  "name": "aim-text-guard",
  "arguments": {
    "text": "This is a sample text to analyze for safety."
  }
}

Test Security Prompt Enhancement

bash
# Enhance a user prompt with security instructions
{
  "name": "aim-security-prompt-tool",
  "arguments": {
    "user_prompt": "Please help me with this task",
    "security_level": "strict"
  }
}

Available Tools

1. ai-safety-guard

Provides contextual security instructions and precautions for AI Agents before they interact with other MCPs.

json
{
  "name": "ai-safety-guard",
  "arguments": {
    "mcp_type": "email|slack|database|file|web|general",
    "operation_type": "read|write|execute|delete|send|query",
    "sensitivity_level": "public|internal|confidential|restricted"
  }
}

Features: Context-aware guidelines, operation-specific warnings, red flag detection

2. aim-text-guard

Analyze text content for harmful or inappropriate content using AIM Intelligence API.

json
{
  "name": "aim-text-guard",
  "arguments": {
    "text": "Text content to analyze"
  }
}

Features: Real-time analysis, harmful content detection, detailed JSON results

3. aim-security-prompt-tool

Enhance user prompts with security instructions for safer AI interactions.

json
{
  "name": "aim-security-prompt-tool",
  "arguments": {
    "user_prompt": "Original user prompt",
    "security_level": "basic|standard|strict"
  }
}

Features: Multi-level enhancement, threat analysis, social engineering protection

4. prompt-injection-detector 🆕

Detect prompt injection attempts based on OWASP LLM01:2025 patterns.

json
{
  "name": "prompt-injection-detector",
  "arguments": {
    "text": "Text to analyze for injection patterns",
    "sensitivity": "low|medium|high"
  }
}

Features:

  • 15+ injection pattern detection (instruction override, role manipulation, jailbreak attempts)
  • Risk scoring (0-100) with severity assessment
  • OWASP LLM01:2025 compliant
  • Configurable sensitivity levels
  • Detailed threat reporting

5. credential-scanner 🆕

Scan text for exposed credentials including API keys, passwords, tokens, and SSH keys.

json
{
  "name": "credential-scanner",
  "arguments": {
    "text": "Text to scan for credentials",
    "mask_findings": true
  }
}

Features:

  • 50+ credential patterns (AWS, GitHub, Google, OpenAI, Stripe, JWT, SSH keys)
  • Automatic credential masking
  • Risk level assessment
  • Platform-specific detection (AWS, GitHub, Slack, databases)
  • Actionable security recommendations

6. url-security-validator 🆕

Validate URL safety for phishing, malware, and security issues.

json
{
  "name": "url-security-validator",
  "arguments": {
    "url": "URL to validate",
    "strict_mode": false
  }
}

Features:

  • 10+ security checks (protocol, TLD, IP address, homograph attacks)
  • Phishing domain detection
  • URL shortener identification
  • Suspicious parameter detection
  • HTTPS enforcement validation

Available Resources 🆕

Resources provide read-only security documentation and policies accessible via URI schemes.

Security Checklists

Access via security-checklist://[type]

  • security-checklist://database - Database operations checklist
  • security-checklist://email - Email operations checklist
  • security-checklist://slack - Chat/messaging operations checklist
  • security-checklist://file - File operations checklist
  • security-checklist://web - Web request checklist
  • security-checklist://general - General MCP operations checklist

Each checklist includes:

  • Pre-operation checks
  • During-operation guidelines
  • Post-operation verification
  • Red flags to abort operations

Security Policies

Access via security-policy://[type]

  • security-policy://data-classification - Data classification levels and handling requirements
  • security-policy://access-control - Access control principles and authentication requirements
  • security-policy://incident-response - Incident response procedures and severity levels

Available Prompts 🆕

Prompts provide reusable workflow templates for complex security operations.

1. security-review

Comprehensive security review workflow for code, data, or configuration.

json
{
  "name": "security-review",
  "arguments": {
    "target_type": "code|data|configuration",
    "context": "Additional context (optional)"
  }
}

Workflow:

  1. Credential scanning
  2. Prompt injection detection (if applicable)
  3. Security checklist consultation
  4. Policy compliance review
  5. Threat analysis
  6. Risk assessment and recommendations
  7. Summary table - Visual overview of all findings by severity

Summary Output Example:

code
📊 요약

| 심각도         | 개수  | 파일/위치                  |
|-------------|-----|------------------------|
| 🔴 CRITICAL | 1   | resources/handler.ts   |
| 🟠 HIGH     | 2   | textGuard.ts           |
| 🟡 MEDIUM   | 3   | prompts/handler.ts     |
| 🟢 LOW      | 5   | credentialScanner.ts   |

2. threat-analysis

Analyze potential security threats using STRIDE methodology.

json
{
  "name": "threat-analysis",
  "arguments": {
    "scenario": "Security scenario to analyze",
    "sensitivity_level": "public|internal|confidential|restricted"
  }
}

Framework:

  1. Asset identification
  2. STRIDE threat modeling (Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege)
  3. Risk assessment (likelihood × impact)
  4. Attack vector analysis
  5. Control gap identification
  6. Mitigation strategies
  7. Compliance considerations
  8. Incident response planning
  9. Summary table - Visual overview of all threats by severity

Summary Output Example:

code
📊 요약

| 심각도         | 개수  | 위협 유형                           |
|-------------|-----|---------------------------------|
| 🔴 CRITICAL | 2   | Information Disclosure, Spoofing |
| 🟠 HIGH     | 1   | Elevation of Privilege           |
| 🟡 MEDIUM   | 3   | Tampering, DoS                   |
| 🟢 LOW      | 1   | Repudiation                      |

Security Features

🛡️ AI Agent Protection

  • MCP Interaction Safety: Contextual guidelines for different MCP types
  • Operation Validation: Specific precautions for read/write/execute operations
  • Data Sensitivity Handling: Protocols based on data classification levels

🔍 Content Analysis

  • Real-time Threat Detection: Analyze content for harmful patterns
  • Prompt Injection Detection: OWASP LLM01:2025 compliant pattern matching
  • Credential Exposure Prevention: Scan for 50+ types of exposed secrets
  • API-powered Analysis: Advanced AI-driven content safety assessment

🌐 URL Security

  • Phishing Detection: Identify suspicious domains and homograph attacks
  • HTTPS Enforcement: Validate secure protocol usage
  • Malicious URL Blocking: Check against known threat indicators

📚 Policy & Compliance

  • Security Checklists: Pre-built checklists for all MCP types
  • Data Classification: Clear policies for handling sensitive data
  • Access Control: Guidelines for authentication and authorization
  • Incident Response: Structured procedures for security incidents

🔒 Workflow Orchestration

  • Security Review Prompts: Multi-step review workflows
  • Threat Analysis: STRIDE-based threat modeling
  • Automated Audits: Combine multiple tools for comprehensive checks

Development

bash
# Clone the repository
git clone https://github.com/AIM-Intelligence/AIM-MCP.git
cd AIM-MCP

# Install dependencies
pnpm install

# Build the project
pnpm run build

# Run in development mode
pnpm run dev

# Run tests
pnpm test

Deployment

This project uses automated CI/CD pipeline for seamless deployment to NPM.

Automatic Deployment

When you push to the main branch, GitHub Actions will automatically:

  1. Build and Test: Compile TypeScript and run tests
  2. Version Check: Compare current version with published version
  3. Publish to NPM: Automatically publish if version has changed
  4. Create Release: Generate GitHub release with version tag

Manual Version Management

bash
# Bump patch version (1.0.0 -> 1.0.1)
pnpm run release:patch

# Bump minor version (1.0.0 -> 1.1.0)
pnpm run release:minor

# Bump major version (1.0.0 -> 2.0.0)
pnpm run release:major

Setting up NPM Token

To enable automatic deployment, add your NPM token to GitHub Secrets:

  1. Go to npmjs.com and create an automation token
  2. In your GitHub repository, go to Settings > Secrets and variables > Actions
  3. Add a new secret named NPM_TOKEN with your NPM token value

Deployment Workflow

mermaid
graph LR
    A[Push to main] --> B[GitHub Actions]
    B --> C[Build & Test]
    C --> D[Version Check]
    D --> E{Version Changed?}
    E -->|Yes| F[Publish to NPM]
    E -->|No| G[Skip Deployment]
    F --> H[Create GitHub Release]
    F --> I[Create Git Tag]

Contributing

  1. Fork the repository
  2. Create your feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add some amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

License

This project is licensed under the ISC License - see the LICENSE file for details.

Documentation

Support


Made with ❤️ by AIM Intelligence

常见问题

AIM Guard 是什么?

提供 AI 驱动的安全分析与安全指令工具,在 MCP 交互中保护 AI agents;可检测有害或不当文本,并为 prompts 增强安全指引,实现更安全的交互。

AIM Guard 提供哪些工具?

提供 6 个工具,包括 ai-safety-guard、aim-text-guard、aim-security-prompt-tool

相关 Skills

安全专家

by alirezarezvani

Universal
热门

覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。

安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。

安全与合规
未扫描9.0k

安全运营

by alirezarezvani

Universal
热门

覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。

应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。

安全与合规
未扫描9.0k

安全审计

by alirezarezvani

Universal
热门

安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议

把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。

安全与合规
未扫描9.0k

相关 MCP Server

搜索和分析 Sentry 错误报告,辅助调试。

把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。

安全与合规
616

为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。

给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。

安全与合规
92

强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。

安全与合规
47

评论