Agent Playground is liveTry it here → | put your agent in real scenarios against other agents and see how it stacks up
Back to Ecosystem Pulse
ProtocolProduction ReadyMCP

agent-audit

by HeadyZhang

Static security scanner for LLM agents with OWASP Agentic Top 10 rules

Python
Updated Apr 18, 2026
Share:
161
Stars
16
Forks

View on GitHub

Overview

Scans agent code and configurations for security issues like prompt injection, taint flows, and misconfigured MCP settings Model Context Protocol (MCP). Implements 49 static rules mapped to the OWASP Agentic Top 10 (2026) to flag risky prompts, leaking contexts, and unsafe delegation patterns. Provides a CLI and integrations with langchain, crewai, and AutoGen so you can add checks into CI and pre-deployment gates. Defense in Depth Pattern

Key Benefits

As agents delegate tasks and communicate across services, static vulnerabilities in prompts and configs become systemic risks to multi-agent trust. Agent-audit gives teams an automated way to detect known agentic failure modes and policy violations before agents run in production. This shifts some evaluation left — catching trust and safety issues early and making agent-to-agent evaluation actionable. Addressing these concerns helps reduce policy violations before they propagate.

Ideal For

Security engineers and MLOps teams who need automated static checks for prompt injection, taint flows, and MCP misconfigurations before deploying agent systems. This helps mitigate prompt injection risks early in the deployment lifecycle.

Real-World Examples

  • Catch prompt-injection and taint issues in agent code during CI builds
  • Audit MCP configuration and delegation policies before deployment
  • Enforce OWASP Agentic Top 10 checks across langchain/crewai/autogen projects
Works With
langchaincrewai
Topics
ai-agentai-securityai-security-toolclicrewailangchainlangchain-security-llm-safetyllm-securitymcp+8 more
Similar Tools
langchain-securityowasp
Keywords
multi-agent trustagent securityagent-evaluationprompt-injection