MCP Preflight Local-first MCP trust review Run free scan
Local-first MCP preflight

Check an MCP setup before you trust it.

Scan config, prompts, tool text, and repo manifests for risky launchers, token passthrough, broad scope, weak transport, and poisoned instructions. The default path stays local and static.

No account required for Lite No network by default Readable findings and rule ids Public trust pages and releases

Free Lite

Use it on a real workspace before you spend anything.

One-time Pro

Pay only when reports, CI, hooks, and presets save real time.

Honest boundary

Preflight review before first trust, not a hosted runtime-control platform.

What it checks today

Focused on the setup material that decides trust.

Phase 1 is intentionally narrow. It is strongest before first run, before team handoff, and before you bury a risky MCP setup inside automation.

Config and launch trust

Catch risky launchers, duplicated server ids, weak transport choices, and config shapes that deserve a second look before use.

Secrets and auth hygiene

Surface hardcoded secrets, token passthrough smells, and environment inheritance that is broader than the server actually needs.

Prompt and tool text risk

Review descriptions and prompt resources for language that can quietly change what a model is willing to do.

Scope and blast radius

Highlight filesystem breadth, broad environment forwarding, and local setup choices that expand the damage from a bad server.

Dependency and install drift

Flag obviously unpinned dependencies, missing lockfiles, and install surfaces that make review harder than it should be.

Readable output

Return plain findings and direct next actions. The point is to help a human decide, not to hide behind a score.

How to use it well

Three steps to evaluate whether it belongs in your workflow.

Run Lite on a real workspace, judge the findings, then buy Pro only if the workflow surfaces save meaningful time.

1

Run Lite on a real repo

Use the CLI, the extension, or the release bundle on a workspace you actually care about, not just a demo.

2

Judge the output, not the branding

Read the rule ids, compare them to the rules page, and inspect the example report and fix guidance.

3

Upgrade only when workflow friction is real

Pro should feel like an honest workflow upgrade for export, CI, hooks, and policy presets�not a ransom gate on basic trust evaluation.

Lite vs Pro

Keep the commercial boundary simple.

Lite should be useful on its own. Pro exists for workflow surfaces that are worth paying for in a real development process.

CapabilityLitePro
Core static scan
config, manifests, prompts, tool text, obvious secret-bearing files
IncludedIncluded
Local-first executionIncludedIncluded
Text and JSON outputIncludedIncluded
Local suppressionsIncludedIncluded
Markdown, HTML, and SARIF reportsNot includedIncluded
Git hooks and CI modeNot includedIncluded
Policy presetsNot includedIncluded
Commercial modelFreeOne-time purchase

Does the default scan connect to the MCP server?

No. The default path is a local static review of setup material before runtime trust.

Do I need an MCP Preflight account?

No for Lite. Pro uses a local license token instead of an account-based workflow.

When should I buy Pro?

When export, hooks, CI, or presets save real time in a workflow you already know you want to keep.

Is this a runtime gateway or managed security platform?

No. It is strongest before first trust, before handoff, and before risky config becomes routine.

Start with proof, not a demo call

Run the free scan. Keep Pro as an honest workflow upgrade.

If the product is doing its job, you should understand the value before checkout: what it scans, what it flags, what it does not do, and how it fits your MCP workflow.