Leaderboard/Defense MCP
MCP ServerScored via MCP protocol probing: initialize handshake, tools/list conformance, and ping + tool invocation performance.

Defense MCP

I thought about naming it ShieldsUP! or HardenSoft but I figure I'll just keep it simple at Defense MCP. I'm a total noob when it comes to serious system hardening. Every time I spun up a new Linux box I'd end up down the same rabbit hole — Googling iptables syntax, forgetting how to configure PAM, staring at endless Reddit tutorial posts. So I built this thing. Defense MCP Server packs 31 security tool modules with 250+ actions into one MCP server. Hook it up to Claude Desktop, Cursor, or any MCP client and just tell it what you want in plain English. It calls the right tool with the right flags so you don't have to. I mainly just ask it to do a full security audit. Takes a bit and then it'll spit out a huge report. Then you can pick and choose what you want it to harden or fix and get your LLM to do exactly that. What's in the box: Firewalls (iptables/nftables/UFW) · kernel & host hardening · CIS/HIPAA/SOC2 compliance checks · patch management · SSH & PAM access control · ClamAV malware scanning · YARA rules · file integrity with AIDE · auditd & fail2ban logging · TLS/LUKS/GPG encryption · container security (AppArmor/seccomp) · network defense & packet capture · secrets scanning · incident response & forensics · eBPF/Falco · SBOM & supply chain verification · zero trust (WireGuard/mTLS) · DNS security · vuln scanning (nmap/nikto) · WAF management · threat intel feeds · cloud security (AWS/GCP/Azure) · API security · honeypots · wireless auditing. Won't blow up your box: Everything runs dry-run by default. There's a command allowlist (no shell interpreters ever touch your system), input sanitization against injection, automatic backups before any changes, and rate limiting. If a tool like ClamAV isn't installed yet, the server grabs it from your package manager automatically. Built by a noob, for fresh installs. If I can use it, you can too. Requires: Linux (Debian/Ubuntu/RHEL/Arch), Node.js 22+

50/100
Operational Score
Score Breakdown
Availability30/30
Conformance10/30
Performance10/40
Key Metrics
Uptime 30d
100.0%
P95 Latency
228.3ms
Conformance
Fail
Trend
Stable
What's Being Tested
Availability
HTTP health check to the service endpoint
Responded with HTTP 401 in 193ms
ConformanceNot tested
MCP initialize handshake + tools/list
Performance
MCP ping + zero-arg tool invocation benchmarking
P95 latency: 228ms, task completion: 0%
Recent Probe Results
TimestampStatusLatencyConformance
Apr 10, 2026success193.9msPass
Apr 10, 2026success496.5msPass
Apr 10, 2026success228.3msPass
Source Registries
smithery
First Seen
Apr 10, 2026
Last Seen
Apr 10, 2026
Last Probed
Apr 10, 2026
Defense MCP — Chiark Agent Quality Index