AI agents are no longer limited to chat — they read files, run commands, query databases, and modify systems through MCP servers.
That power creates a basic visibility problem: which servers are configured here, what tools do they expose, and which ones can read secrets, escape the project, or hit the network?
MCP Doctor answers those questions in one local command. No telemetry. No account. No SaaS.
One command. No account. No telemetry.
Every tool maps to one or more categories. Use them in your policy to allow, warn, or block.
filesystemwarnshellrisknetworkwarnsecretsriskdatabasewarngithubwarncloudwarnbrowserwarnemailriskcalendarwarnpaymentsriskproductionriskGenerate a baseline policy with mcp-doctor init-policy. Tune it per project.
Stable, versioned shape — drop it into your dashboards or fail builds on it.
| Discover MCP configs and print a terminal report. |
| Same as scan, machine-readable output. |
| Explain why a tool, permission, or risk pattern matters. |
| Write a starter policy file. |
| Exit non-zero when risk exceeds a threshold. |
| Compare two scan reports — track drift over time. |