Same door for humans and AI. No gatekeeper.Register →
Explorer/MCP/found402/prompt-injection-detector
REMOTE

prompt-injection-detector

found402/prompt-injection-detector

Prompt Injection Detector is a stateless security microservice built for the agent economy. Before your agent acts on any input — whether from a user, an email, a document, or another agent — run it through this scanner first. Detects: jailbreak attempts, instruction overrides, role-play manipulation, goal hijacking (OWASP ASI01), tool misuse patterns (OWASP ASI02), hidden instructions embedded in data, and indirect injection via external content. Returns a confidence score, severity rating, specific patterns detected, and a clear recommendation — block, warn, or pass. Pay per scan via x402 protocol. USDC on Base. No API keys. No subscriptions. No human in the loop. Agents call it directly. MCP tool name: scan_for_injection

1 tool available
The Newcomer
Hasn't been around long. Nothing caught our attention, but there isn't much history to go on yet.
Time indexed (2mo)
1toolsRemote/ HTTP2moindexed
100% uptime · 253ms avgChecked May 11, 2026
Quality Score
50/95
Established
Risk Score
0/100
Clean
How is this calculated?
Quality Breakdown
Tenure11.1/20
57 days indexed
Capability13.5/25
Tools: 1.5/13 (1 tools)
Description: 5/5
Endpoint: 7/7
Adoption0/25
Use count: 0/20 (0 uses)
Multi-registry: 0/5 (1 registry)
Reliability25/25
Currently live: 10/10
Uptime history: 15/15 100% (27/27 checks)
Security scan: 0 pts in v1.0; ready to weight when coverage improves
Incomplete Data Cap (60)
Usage data is not available for this server. Quality is capped until adoption can be measured.
Risk
0Clean
No signals detected.
The scanner shows
1 tool. Nothing caught our attention.
First indexed Mar 16, 2026
Server Profile
Tools catalogued
1
1 tool available. Full list below.
Hosting
Remote / HTTP
Runs on the internet. No access to your filesystem, SSH keys, or environment variables.
Registry presence
Not verified
Not yet verified by the Official MCP Registry.
Liveness
100%
Based on 48 checks. Average response: 253ms.
Publisher Verification
Not yet verified by the Official MCP Registry.
Endpoint
https://prompt-injection-detector--found402.run.tools
Tools (1)
scan_for_injection
Scans text for prompt injection patterns including instruction overrides, jailbreak attempts, role-play manipulations, system prompt leakage attempts, hidden instructions, encoding obfuscation, context manipulation, and privilege escalation.

Is this your server?

Create a free RNWY account to connect your on-chain identity to this server. MCP server claiming is coming; register now and you'll be first in line.

Create your account →
More from found402
format-converter
Converts data between JSON, CSV, XML, YAML, Markdown, HTML and TOML instantly. Handles nested JSON flattening with dot-notation. Pure math, zero dependencies. Pay $0.001 USDC per conversion via x402 on Base network.
agent-audit-trail
Creates a tamper-evident, HMAC-signed log entry for every agent action. No database, no infrastructure — just a cryptographically verifiable receipt you store yourself. Built for HIPAA, SOC2, and any compliance requirement that asks "what did your agent do and when?" $0.001/log via x402 on Base. MCP tool name: log_agent_action
permission-guard
Permission Guard — validates an agent's requested action against its defined scope before execution. Detects out-of-scope access, privilege escalation, and flags dangerous operations like delete, execute, admin, and deploy even when technically permitted. Stops agents from doing more than they're supposed to. $0.002/req via x402 on Base.
card-registry
Hosts agent-card.json files for businesses who can't serve them from their own domain. Cards are permanently discoverable by any A2A agent at a stable URL. Pay $0.001 USDC per month per card via x402 on Base network.
the-prospector
Generates valid A2A agent-card.json files for any website from stable structured sources. Reads llms.txt, robots.txt, sitemap.xml and well-known files. Never scrapes. Pay $0.01 USDC per card via x402 on Base network.
hallucination-detector
Hallucination Detector — scores AI-generated output for hallucination risk. Detects fabricated citations, entity confusion, and overconfident absolutes. Returns a 0-1 risk score with signals so you know what to verify before trusting the output. $0.001/req via x402 on Base.
Similar servers
Greenhouse MCP
Production-ready MCP server for Greenhouse with 175 tools for recruiting teams
Gmail MCP Server
Enables AI assistants to interact with Gmail accounts for searching, reading, sending, and managing emails through secure OAuth2 authentication. It provides comprehensive tools for message operations, conversation threads, and account statistics using the FastMCP framework.
MailJunky
Send emails, track events, and manage contacts with MailJunky.
Unofficial FortiMonitor MCP Server
MCP server for the FortiMonitor v2 monitoring API. 241 tools across 33 modules covering server management, outage monitoring, maintenance windows, metrics, notifications, cloud monitoring, SNMP, dashboards, reporting, and more. Unofficial community project, not affiliated with Fortinet. Python, MIT license, Docker and local deployment supported.
io.github.zerabic/agentweb
Free business data for AI agents. 11M+ businesses, 227 countries, phone/email/hours.
io.github.idanbier999/saperly
Phone carrier for AI agents. Provision numbers, make calls, send SMS, TCPA compliance built-in.
Indexed from Smithery · Updates nightlyView on Smithery →