MEDUSA detects prompt injection, MCP vulnerabilities, RAG poisoning, agent attacks, and 221 CVEs across your AI/ML stack. 514 false positive filters for 96.8% FP reduction. Free and open source.
$ pip install medusa-security && medusa scan .
Run one command. Get a full AI security audit across 78 scanners in seconds.
LLM agents, MCP servers, and RAG pipelines introduce attack surfaces that traditional scanners miss
Prompt injection, jailbreaking, and tool poisoning can hijack your AI agents. CVE-2025-6514 proved MCP servers are already being exploited. Traditional SAST tools don't detect these attack vectors.
RAG poisoning, dataset injection, and model extraction attacks happen before your code even runs. Your training data, embeddings, and knowledge bases can all be vectors for adversarial content.
MCP, UCP, AP2, and ACP are powerful but introduce discovery endpoint attacks, credential smuggling, and cross-tool exploitation. These protocols need security scanning from day one.
78 analyzers, 9,600+ detection patterns, and 514 FP filters covering the entire AI security landscape
Industry-leading coverage for prompt injection, jailbreaking, MCP tool poisoning, RAG security, agent memory attacks, supply chain risks, and traditional SAST. 514 false positive filters ensure 96.8% FP reduction.
91 dedicated rules for MCP, UCP, AP2, and ACP vulnerabilities. Detect discovery endpoint attacks, credential smuggling, tool poisoning, and cross-agent exploitation.
221 CVEs via CVEMiner covering LangChain, PyTorch, MCP, LlamaIndex, and more. Version-aware SCA detection — only flags installed vulnerable versions.
Works immediately after pip install. No external tools, no API keys, no configuration needed. Just install and scan. Multi-core parallel processing out of the box.
Works with Claude Code, Cursor, VS Code, and Gemini CLI. Get AI security feedback right in your development workflow. SARIF output for GitHub Code Scanning.
Export to JSON, HTML, SARIF, or Markdown. Glassmorphism HTML dashboard, machine-readable JSON for CI/CD, and SARIF for GitHub integration.
Updated for OWASP Top 10 for LLM Applications 2025 and MITRE ATLAS
The biggest rule expansion in MEDUSA's history — 9,600+ patterns, smarter detection, zero duplicates.
More than doubled from v2026.3.0. Added 40+ new rule categories including synthetic data poisoning, federated learning attacks, MoE vulnerabilities, watermarking bypass, provenance attribution, and voice/audio attacks. Zero duplicate rule IDs — clean, deduplicated coverage.
Rebuilt the CVE engine from the ground up. Rules now use OSV-standard version ranges (introduced/fixed) so you only get flagged if your installed version is actually vulnerable. Covers Python, npm, Java, Go, Rust, Ruby, and PHP ecosystems.
New medusa scan --git flag scans your entire git history for injected attack payloads. Detects Clinejection, ToxicSkills, and repo-level prompt injection backdoors that target AI coding assistants reading your codebase.
CodePatternAnalyzer pre-scans your project before the main scan runs. Detects your languages, frameworks, and AI patterns (LangChain, MCP, RAG, agents) and routes files to only the relevant scanners — 17x faster on large codebases.
Free forever for open-source scanning. Pro adds an ultra-fast runtime proxy that blocks attacks in real time.
Install MEDUSA and scan your first project right now.
$ pip install medusa-security && medusa scan .