MCP Permission Auditor
What This Tool Does
MCP Permission Auditor is built for deterministic developer and agent workflows.
Audit MCP server configurations for security risks. Get permission surface analysis, risk scores, and least-privilege recommendations. Fully client-side.
Use How to Use for execution steps and FAQ for constraints, policies, and edge cases.
Last updated:
This tool is provided as-is for convenience. Output should be verified before use in any production or critical context.
Agent Invocation
Best Path For Builders
Browser workflow
Runs instantly in the browser with private local processing and copy/export-ready output.
Browser Workflow
This tool is optimized for instant in-browser execution with local data handling. Run it here and copy/export the output directly.
/mcp-permission-auditor/
For automation planning, fetch the canonical contract at /api/tool/mcp-permission-auditor.json.
How to Use MCP Permission Auditor
- 1
Paste your MCP config
Copy your MCP server configuration JSON (from Claude Desktop, Cursor, or Windsurf settings) and paste it into the input area. Click Load Sample to see an example.
- 2
Review per-server analysis
Each configured server gets an analysis card showing detected capabilities (filesystem, network, database, code execution), risk score, and specific findings.
- 3
Check for dangerous combinations
The tool flags dangerous capability combinations — like filesystem plus network access (exfiltration risk) — and credentials exposed in environment variables or arguments.
- 4
Apply recommendations
Follow the least-privilege suggestions to tighten permissions: scope file paths, move credentials to secure storage, and remove unnecessary server capabilities.