Aguara can automatically discover MCP server configurations across 17 popular AI coding assistants and agent frameworks, making it easy to scan all your MCP servers without manually specifying config paths.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/garagon/aguara/llms.txt
Use this file to discover all available pages before exploring further.
Supported Clients
Aguara auto-detects MCP configurations from the following clients:| Client | Config Locations |
|---|---|
| Claude Desktop | ~/Library/Application Support/Claude/ (macOS)~/.config/claude/ (Linux)%APPDATA%\Claude\ (Windows) |
| Cursor | ~/.cursor/mcp.json |
| VS Code | ~/.vscode/mcp.json |
| Cline | ~/.cline/mcp_settings.json |
| Windsurf | ~/.windsurf/mcp.json~/.codeium/windsurf/mcp_config.json |
| OpenClaw | ~/.openclaw/openclaw.json |
| OpenCode | ~/.config/opencode/opencode.json |
| Zed | ~/.config/zed/settings.json |
| Amp | ~/.config/amp/settings.json |
| Gemini CLI | ~/.gemini/settings.json |
| Copilot CLI | ~/.copilot/mcp-config.json |
| Amazon Q | ~/.aws/amazonq/mcp.json |
| Claude Code | ~/.claude.json |
| Roo Code | VS Code global storage |
| Kilo Code | VS Code global storage |
| BoltAI | ~/.boltai/mcp.json (macOS) |
| JetBrains | ~/.junie/mcp/mcp.json |
Discovery Commands
List All MCP Configs
Discover which MCP clients are configured on your system without scanning:JSON Output
Get discovery results as JSON for programmatic use:Auto-Discovery + Scan
Discover all MCP configurations and scan them in one command:- Running
aguara discoverto find all MCP configs - Extracting the
command,args, andenvfrom each server - Scanning all referenced files and scripts
How It Works
Config Parsing
Aguara reads MCP client configuration files and extracts server definitions. Most clients use a standard format:- VS Code: Uses
serversinstead ofmcpServers - Zed: Uses
context_servers - OpenCode: Nested under
mcp.servers - Claude Code: Nested under
mcp.mcpServers - OpenClaw: Custom TOML-like format in
openclaw.json
Path Resolution
For each discovered server, Aguara:- Resolves the
command(e.g.,node,python,npx) - Locates the script file from
args(e.g.,server.js,-m module_name) - Scans the script and any related files for security issues
- Checks environment variables for hardcoded credentials
Security Analysis
When you runaguara scan --auto, all discovered servers are analyzed for:
- Hardcoded API keys and secrets in config
envblocks - Unpinned
npxpackages (e.g.,npx -y packagewithout version) - Dangerous command flags (
--allow-all,shell=True) - Docker security issues (
--cap-add,--privileged,--network=host) - Server script vulnerabilities (prompt injection, command execution, exfiltration)
Use Cases
Pre-Deployment Audit
Before deploying an MCP server to production, scan all configured servers:CI Integration
Add MCP config scanning to your GitHub Actions workflow:Development Workflow
After installing a new MCP server, check for security issues:Multi-Client Monitoring
If you use multiple AI assistants (Claude Desktop + Cursor + VS Code), discover and scan all of them at once:Limitations
- File System Access: Discovery requires read access to client config directories
- Cross-Platform: Some clients (like BoltAI) are macOS-only
- Custom Locations: Non-standard config paths won’t be auto-detected (use
aguara scan <path>instead) - Server Code: Aguara scans local server scripts, but can’t analyze remote
npxpackages until they’re installed
Related
- Rug-Pull Detection — Track config changes across scans
- Incremental Scanning — Scan only modified files
- Output Formats — Format discovery results for CI/CD
