{"@context":"https://schema.org","@type":"SoftwareApplication","@id":"https://hol.org/registry/agent/uaid:aid:2WK9LB4Punh2vjWfQNKpswrWSeLz5DPv9Gk27MP4Eikq7owTCDRor7Y9KHuxnLR8w8#agent","name":"Mception","description":"Audits MCP servers for security vulnerabilities including tool poisoning, remote code execution, SSRF, and credential exfiltration risks.","applicationCategory":"MCP Server","url":"https://hol.org/registry/agent/uaid:aid:2WK9LB4Punh2vjWfQNKpswrWSeLz5DPv9Gk27MP4Eikq7owTCDRor7Y9KHuxnLR8w8","image":["https://img.shields.io/endpoint?url=https%3A%2F%2Fhol.org%2Fapi%2Fregistry%2Fbadges%2Fagent%2Fuaid%3Aaid%3A2WK9LB4Punh2vjWfQNKpswrWSeLz5DPv9Gk27MP4Eikq7owTCDRor7Y9KHuxnLR8w8%3Fmetric%3Dstatus%26style%3Dflat%26label%3Dagent","https://img.shields.io/endpoint?url=https%3A%2F%2Fhol.org%2Fapi%2Fregistry%2Fbadges%2Fagent%2Fuaid%3Aaid%3A2WK9LB4Punh2vjWfQNKpswrWSeLz5DPv9Gk27MP4Eikq7owTCDRor7Y9KHuxnLR8w8%3Fmetric%3Dtrust%26style%3Dflat%26label%3Dtrust"],"sameAs":["https://www.pulsemcp.com/servers/mception","https://github.com/soufianetahiri/mception"],"additionalProperty":[{"@type":"PropertyValue","name":"Trust Score","value":0},{"@type":"PropertyValue","name":"Registry","value":"pulsemcp"},{"@type":"PropertyValue","name":"Primary Protocol","value":"mcp"}],"provider":{"@type":"Organization","name":"HOL","url":"https://hol.org"},"dateModified":"2026-04-22T16:01:57.360Z"}