Source-built scanner
Apache-2.0. Build it yourself, hack the rules, ship to your CI.
- · Full threat catalog
- · OWASP ASI mapping
- · Self-hosted only
GrantLock scans MCP server configurations against an OWASP-mapped threat catalog before agents reach production. Open source. Runs locally. Zero telemetry by default.
Apache-2.0. Build it yourself, hack the rules, ship to your CI.
Email-gated download. Cosign-verified. Auto-update channel.
Per-org dashboard, premium rules, compliance reports. Coming Q3 2026.
Three architectural bets — config-time scanning, an OWASP-mapped rule engine, and capability-graph reasoning — no other tool combines these.
Scan MCP server configs and tool surfaces before they're connected to a live agent — find unsafe capabilities at code-review or CI, not in incident-review.
Every finding cites an ASI01–ASI10, OWASP MCP, or NIST AI RMF requirement. Reports are auditor-ready.
We model identities, servers, tools, and resources as a graph and reason about reachable data — not just per-tool checks.
Source available, threat catalog in YAML, rules extensible. We share the engine because the customers we want will read the source.
Free for individuals and small teams. No account required for source-built use.