Skip to content

CLI Reference

Command-line interface for scanning, verification, gate proxy, and server management.


Scan MCP tool definitions for security issues.

OptionDescription
--server CMDMCP server command to scan (e.g., "npx @scope/mcp-server")
--file PATH, -fScan tools from a JSON file (no server connection)
--config PATH, -cScan servers from an IDE config file
(none)Auto-discover servers from IDE configs
--detailsShow affected tools, fix suggestions, and counterexamples
--format text|json|sarif, -oOutput format (default: text)
--output PATH, -OWrite output to file instead of stdout
--timeout SECS, -tConnection timeout in seconds (default: 30)
--trust-projectInclude project-level configs in auto-discovery
--no-classifierDisable the ML classifier (L2.5) layer
--classifier-threshold FLOATML classifier minimum score, 0.0-1.0 (default: 0.5)
--source DIR, -sSource code directory for L7 handler analysis
--no-sourceDisable automatic npm source extraction for L7
--verbose, -vShow all findings including LOW/INFO
--quiet, -qOnly show findings, no header/footer

Exit codes: 0 = no CRITICAL/HIGH findings, 1 = CRITICAL/HIGH found, 2 = error.


Scan MCP config files for supply chain security issues. No server connections needed.

OptionDescription
--config PATH, -cScan a specific config file
(none)Auto-discover all IDE config files
--details, -dShow affected servers and fix suggestions
--format text|json|sarif, -oOutput format (default: text)
--output PATH, -OWrite output to file instead of stdout
--trust-projectInclude project-level configs in auto-discovery
--quiet, -qOnly show findings, no header/footer

Exit codes: 0 = no CRITICAL/HIGH findings, 1 = CRITICAL/HIGH found, 2 = error.


Analyze multi-server MCP configurations for dangerous attack chains.

OptionDescription
--config PATH, -cConfig file with MCP server definitions
--schemas-dir DIR, -sDirectory with pre-fetched tool schema JSON files
(none)Auto-discover servers from IDE configs
--details, -dShow chain details and capabilities
--format text|json|markdown, -oOutput format (default: text)
--output PATH, -OWrite output to file instead of stdout
--quiet, -qMinimal output

Exit codes: 0 = no CRITICAL/HIGH chains, 1 = CRITICAL/HIGH found, 2 = error.


Verify a single action against constraints.

OptionDescription
ACTION_JSON (argument)Action as JSON string, or - for stdin
--constraints NAME, -cConstraint pack name (default: generic)
--mode enforce|shadow|disabled, -mVerification mode (default: enforce)
--constraints-dir DIR, -dConstraints directory path (default: constraints)
--format text|json, -fOutput format (default: text)
--include-values/--no-valuesInclude actual values in violations (default: on)
--quiet, -qExit code only, no output

Exit codes: 0 = allowed, 1 = blocked, 2 = error.

Example:

Terminal window
munio check '{"tool": "http_request", "args": {"url": "http://evil.com"}}'

Run the MCP stdio proxy with runtime constraint verification.

OptionDescription
COMMAND ARGS... (argument)Server command and args (after --)
--constraints-dir DIR, -dPath to constraints directory
--packs NAMES, -pComma-separated constraint pack names
--mode enforce|shadow|disabled, -mVerification mode (default: enforce)
--log PATH, -lPath to JSONL log file
--verbose, -vEnable debug logging

Example:

Terminal window
munio gate -- npx @modelcontextprotocol/server-filesystem /tmp

Auto-detect MCP configs and wrap servers with munio gate.

OptionDescription
--dry-runPreview changes without writing
--config PATH, -cPath to a specific config file

Discovers Claude Desktop, Cursor, VS Code, Windsurf, Cline, and JetBrains configs.


Show discovered MCP configs and their munio gate protection status.

No options. Displays a table of all discovered servers with their wrapped/unprotected status.


Remove munio wrapper and restore original MCP server commands.

OptionDescription
--dry-runPreview changes without writing
--config PATH, -cPath to a specific config file

Show interception statistics from a gate JSONL log file.

OptionDescription
LOG_FILE (argument)Path to JSONL log file
--top N, -tNumber of top blocked tools to show (default: 10)
--json, -jOutput as JSON

Start the HTTP API server for remote verification.

OptionDescription
--host ADDR, -HBind address (default: 127.0.0.1)
--port PORT, -pBind port (default: 8080)
--constraints-dir DIR, -dConstraints directory path
--pack NAMEDefault constraint packs (repeatable, default: generic)
--mode enforce|shadow|disabled, -mVerification mode (default: enforce)
--workers N, -wUvicorn worker count (default: 1)
--cors-origins ORIGINSCORS allowed origins, comma-separated (default: none)
--log-level LEVELLog level (default: info)

Requires: pip install "munio[server]" (fastapi + uvicorn).


Run Tier 4 deploy-time Z3 policy verification.

OptionDescription
--constraint-file PATH, -fPath to a Tier 4 YAML constraint file
--check-name NAME, -nName of a Tier 4 constraint from the registry
--constraints-dir DIR, -dConstraints directory path
--pack NAME, -pConstraint packs to load (repeatable)
--format text|jsonOutput format (default: text)

Exit codes: 0 = SAFE, 1 = UNSAFE, 2 = ERROR/UNKNOWN/TIMEOUT.

Requires: pip install "munio[z3]".


Audit constraints directory for statistics and issues.

OptionDescription
--constraints-dir DIR, -dConstraints directory path (default: constraints)
--pack NAME, -pSpecific packs to audit (repeatable, default: all)
--format text|json, -fOutput format (default: text)
--strictExit 1 if issues detected (for CI)

Show munio version and Z3 availability. No options.