Skip to content

Architecture Overview

For detailed architecture diagrams and module breakdown, see the full architecture doc.

Scanning pipeline

graph LR
    A[MCP Client Configs] --> B[Discovery]
    B --> C[Package Extraction]
    C --> D[CVE Lookup]
    D --> E[Blast Radius]
    E --> F[Compliance Mapping]
    F --> G[Output]

    D --> |OSV, NVD, EPSS| H[(Vuln DBs)]
    B --> |20 clients| I[Config Files]

Key modules

Module Path Purpose
Discovery src/agent_bom/discovery/ MCP client config parsing
Enrichment src/agent_bom/enrichment.py CVE lookup (OSV, NVD, EPSS, KEV)
Blast Radius src/agent_bom/blast_radius.py Impact chain mapping
Context Graph src/agent_bom/context_graph.py Lateral movement analysis
Registry src/agent_bom/registry.py 427+ server security metadata
Compliance src/agent_bom/compliance/ 10 framework mappings
Proxy src/agent_bom/proxy.py Runtime MCP interception
Protection src/agent_bom/runtime/ 5-detector anomaly engine
Enforcement src/agent_bom/enforcement.py Tool poisoning detection
Security src/agent_bom/security.py Path validation, credential redaction
MCP Server src/agent_bom/mcp_server.py 20-tool FastMCP server
API src/agent_bom/api/ REST API (FastAPI)
Output src/agent_bom/output/ HTML, Prometheus, Mermaid, SVG, STIX

Security boundaries

  • All scanning is local-first — zero outbound calls except public vuln databases
  • Config file env var values are always redacted before output
  • Path validation restricts file access to user home directory
  • No telemetry, no analytics, no tracking