Inkog MCP Server

1

Add it to Claude Code

Run this in a terminal.

Run in terminal
claude mcp add -e "INKOG_API_KEY=${INKOG_API_KEY}" inkog -- npx -y @inkog-io/mcp
Required:INKOG_API_KEY
README.md

Security co-pilot for AI agents.

Inkog MCP Server

Build secure AI agents from the start. Inkog is the security co-pilot for AI agent development — scan for vulnerabilities, verify AGENTS.md governance, audit MCP servers before installation, and map to EU AI Act compliance. Available in Claude, ChatGPT, Cursor, and any MCP-compatible client.

When to Use Inkog

  • Building an AI agent — Scan during development to catch infinite loops, prompt injection, and missing guardrails before they ship
  • Adding security to CI/CD — Add inkog-io/inkog@v1 to GitHub Actions for automated security gates on every PR
  • Preparing for EU AI Act — Generate compliance reports mapping your agent to Article 14, NIST AI RMF, OWASP LLM Top 10
  • Reviewing agent code — Use from Claude Code, Cursor, or any MCP client to get security analysis while you code
  • Auditing MCP servers — Check any MCP server for tool poisoning, privilege escalation, or data exfiltration before installing
  • Verifying AGENTS.md — Validate that governance declarations match actual code behavior
  • Building multi-agent systems — Detect delegation loops, privilege escalation, and unauthorized handoffs between agents

What Inkog Does

  • Logic Flaw Detection: Find infinite loops, recursion risks, and missing exit conditions
  • Security Analysis: Detect prompt injection paths, unconstrained tools, and data leakage risks
  • AGENTS.md Governance: Validate that code behavior matches governance declarations
  • Compliance Reporting: Generate reports for EU AI Act, NIST AI RMF, OWASP LLM Top 10
  • MCP Server Auditing: Audit any MCP server before installation
  • Multi-Agent Analysis: Audit Agent-to-Agent communications for logic and security issues

Installation

Claude Desktop

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "inkog": {
      "command": "npx",
      "args": ["-y", "@inkog-io/mcp"],
      "env": {
        "INKOG_API_KEY": "sk_live_your_api_key"
      }
    }
  }
}

Cursor

Add to your Cursor MCP settings:

{
  "mcpServers": {
    "inkog": {
      "command": "npx",
      "args": ["-y", "@inkog-io/mcp"],
      "env": {
        "INKOG_API_KEY": "sk_live_your_api_key"
      }
    }
  }
}

Global Installation

npm install -g @inkog-io/mcp

Getting Your API Key

  1. Sign up for free at app.inkog.io
  2. Copy your API key from the dashboard
  3. Set it as INKOG_API_KEY environment variable

Available Tools

P0 - Core Analysis (Essential)

Tool Description
inkog_scan Static analysis for logic flaws and security risks
inkog_verify_governance Validate AGENTS.md declarations match actual code behavior

P1 - Enterprise Features

Tool Description
inkog_compliance_report Generate EU AI Act, NIST, OWASP compliance reports
inkog_explain_finding Get detailed remediation guidance for findings
inkog_audit_mcp_server Audit any MCP server before installation
inkog_generate_mlbom Generate ML Bill of Materials (CycloneDX, SPDX)

P2 - Multi-Agent Analysis

Tool Description
inkog_audit_a2a Audit Agent-to-Agent communications

Tool Details

inkog_scan

Static analysis for AI agent code - finds logic flaws and security risks.

Arguments:
  path     (required) File or directory path to scan
  policy   (optional) Analysis policy: low-noise, balanced, comprehensive, governance, eu-ai-act
  output   (optional) Output format: summary, detailed, sarif

Example: "Scan my LangChain agent for logic flaws"

inkog_verify_governance

Validate that AGENTS.md declarations match actual code behavior. This is Inkog's unique differentiator - no other tool does governance verification.

Arguments:
  path     (required) Path to directory containing AGENTS.md and agent code

Example: "Verify my agent's governance declarations"

inkog_compliance_report

Generate compliance reports for regulatory frameworks.

Arguments:
  path      (required) Path to scan
  framework (optional) eu-ai-act, nist-ai-rmf, iso-42001, owasp-llm-top-10, all
  format    (optional) markdown, json, pdf

Example: "Generate an EU AI Act compliance report for my agent"

inkog_explain_finding

Get detailed explanation and remediation guidance for a security finding.

Arguments:
  finding_id (optional) Finding ID from scan results
  pattern    (optional) Pattern name (e.g., prompt-injection, infinite-loop)

Example: "Explain how to fix prompt injection vulnerabilities"

inkog_audit_mcp_server

Secur

Tools (7)

inkog_scanStatic analysis for logic flaws and security risks.
inkog_verify_governanceValidate AGENTS.md declarations match actual code behavior.
inkog_compliance_reportGenerate EU AI Act, NIST, OWASP compliance reports.
inkog_explain_findingGet detailed remediation guidance for findings.
inkog_audit_mcp_serverAudit any MCP server before installation.
inkog_generate_mlbomGenerate ML Bill of Materials (CycloneDX, SPDX).
inkog_audit_a2aAudit Agent-to-Agent communications.

Environment Variables

INKOG_API_KEYrequiredAPI key obtained from app.inkog.io

Configuration

claude_desktop_config.json
{"mcpServers": {"inkog": {"command": "npx", "args": ["-y", "@inkog-io/mcp"], "env": {"INKOG_API_KEY": "sk_live_your_api_key"}}}}

Try it

Scan my LangChain agent code for logic flaws and security risks.
Verify that my agent's AGENTS.md governance declarations match the actual code behavior.
Generate an EU AI Act compliance report for my current agent project.
Explain how to fix the prompt injection vulnerability found in my scan results.
Audit this MCP server configuration before I install it.

Frequently Asked Questions

What are the key features of Inkog?

Static analysis for logic flaws like infinite loops and recursion risks. Security analysis for prompt injection and data leakage. AGENTS.md governance validation. Compliance reporting for EU AI Act, NIST AI RMF, and OWASP LLM Top 10. Audit capabilities for MCP servers and multi-agent communications.

What can I use Inkog for?

Catching security vulnerabilities during AI agent development. Automating security gates in CI/CD pipelines for AI projects. Ensuring regulatory compliance for AI agents before deployment. Auditing third-party MCP servers for tool poisoning or privilege escalation. Validating governance declarations in multi-agent systems.

How do I install Inkog?

Install Inkog by running: npx -y @inkog-io/mcp

What MCP clients work with Inkog?

Inkog works with any MCP-compatible client including Claude Desktop, Claude Code, Cursor, and other editors with MCP support.

Turn this server into reusable context

Keep Inkog docs, env vars, and workflow notes in Conare so your agent carries them across sessions.

Need the old visual installer? Open Conare IDE.
Open Conare