MCP Permission Auditor

What This Tool Does

MCP Permission Auditor is built for deterministic developer and agent workflows.

Audit MCP server configurations for security risks. Get permission surface analysis, risk scores, and least-privilege recommendations. Fully client-side.

Use How to Use for execution steps and FAQ for constraints, policies, and edge cases.

Last updated:

This tool is provided as-is for convenience. Output should be verified before use in any production or critical context.

Agent Invocation

Best Path For Builders

Browser workflow

Runs instantly in the browser with private local processing and copy/export-ready output.

Browser Workflow

This tool is optimized for instant in-browser execution with local data handling. Run it here and copy/export the output directly.

/mcp-permission-auditor/

For automation planning, fetch the canonical contract at /api/tool/mcp-permission-auditor.json.

How to Use MCP Permission Auditor

  1. 1

    Paste your MCP config

    Copy your MCP server configuration JSON (from Claude Desktop, Cursor, or Windsurf settings) and paste it into the input area. Click Load Sample to see an example.

  2. 2

    Review per-server analysis

    Each configured server gets an analysis card showing detected capabilities (filesystem, network, database, code execution), risk score, and specific findings.

  3. 3

    Check for dangerous combinations

    The tool flags dangerous capability combinations — like filesystem plus network access (exfiltration risk) — and credentials exposed in environment variables or arguments.

  4. 4

    Apply recommendations

    Follow the least-privilege suggestions to tighten permissions: scope file paths, move credentials to secure storage, and remove unnecessary server capabilities.

Frequently Asked Questions

What is MCP Permission Auditor?
MCP Permission Auditor analyzes MCP server configurations for security risks — it classifies server capabilities, scores risk levels, detects dangerous capability combinations, and provides least-privilege recommendations.
Which MCP config formats are supported?
Claude Desktop, Cursor, and Windsurf JSON config formats. The tool recognizes 50+ well-known MCP servers and uses heuristics for unknown servers.
Is MCP Permission Auditor free?
Yes. Completely free with no account or sign-up required.
Does it send my MCP configuration to a server?
No. All analysis happens in your browser. Your MCP configurations — which may contain API tokens — never leave your device.
What are dangerous capability combinations?
For example, a server with both filesystem access and network access creates an exfiltration risk — it could read files and send them externally. The tool detects these combinations and flags them as critical findings.