Parses server names, commands, args, env key names, and risk hints.
Review this tool before you add it
Paste a GitHub or MCP repo link. Get a read-only install review before the tool reaches your shell, files, browser, or secrets.
read-only local scan + Gemma 4 review
Scanner finds evidence. Gemma 4 makes the install call.
Gemma 4 reads the redacted surface map, connects combined risks, and returns the install posture and constraints your coding agent should follow.
Paste MCP repo -> Gemma reviews install risk -> copy constraints for your agent.
scan_github_tool(url) -> install_context -> safe agent constraints
Install-facing signals, not a full source audit
Flags terminal/process surfaces that need approval gates and isolation.
Looks for browser automation and profile reuse that could expose cookies.
Highlights broad local paths, filesystem MCPs, and oversized mounts.
Records secret-adjacent key names while redacting values from reports.
Treats repo instruction files and prompt-override text as untrusted context.
Common MCP installs to review before adding
Representative templates, not safety certifications.
Gemma 4 install verdict
Loading report...
Loading comparison...
Top Risks
Hardening Plan
Copy install context
Waiting on scan.
Risk signals found
Each signal is a permission pressure point. The count shows how often the scanner saw it in install-facing files.