How It Works
- Configuration Discovery: The Runlayer CLI reads MCP configuration files, skill artifacts (SKILL.md, AGENTS.md, rule files), and installed plugin artifacts from known locations
- Secure Submission: Configuration, skill, and plugin data is securely submitted to Runlayer
- Classification: Runlayer classifies each discovery:
- MCP Servers are classified as:
- Managed: Running through Runlayer (approved and monitored)
- Shadow: Configured outside Runlayer (flagged for review)
- Skills are classified as:
- Managed: Published and managed through Runlayer
- Shadow: Installed outside organizational control (flagged for review)
- Outdated: Previously managed but now out of date
- Skill Risk Levels: Each discovered skill is assigned a risk level:
- High: Skill contains risky instructions (prompt injection, data exfiltration patterns)
- Medium: Skill has potentially risky characteristics that warrant review
- Low: Skill has minor concerns but is unlikely to pose a threat
- Minimal: Skill appears safe with no concerning patterns detected
- MCP Servers are classified as:
- Alerting: Administrators and security teams are notified of newly discovered shadow servers and skills
Security Team Workflow
Discovery and Inventory
Discovery and Inventory
- Get visibility into all MCP servers and skills across your organization
- Identify which AI tools employees are using (Cursor, Claude, VS Code, etc.)
- Build an inventory of shadow integrations and skills for risk assessment
- Track trends in MCP and skill adoption over time
Server Risk Assessment
Server Risk Assessment
When shadow MCP servers are discovered, evaluate:
- Source: Is the MCP from a known vendor or unknown source?
- Permissions: What data and systems can it access?
- User context: Who configured it and for what purpose?
- Network exposure: Does it connect to external endpoints?
Skill Risk Assessment
Skill Risk Assessment
When shadow skills are discovered, evaluate:
- Risk level: Is the skill flagged as High or Medium risk?
- Instructions: Does the skill contain prompts that could manipulate AI behavior?
- Source: Is the skill from a trusted repository or an unknown source?
- Scope: What actions does the skill instruct the AI to perform?
Response Actions
Response Actions
Based on risk assessment:
- Low risk: Migrate to Runlayer-managed server or skill for visibility
- Medium risk: Require user to submit for approval review
- High risk: Immediate remediation via MDM policy or direct intervention
- Risky: Incident response, credential rotation, forensic analysis
Supported Clients
| Client | macOS | Windows | Skills | Plugins |
|---|---|---|---|---|
| Cursor | ✓ | ✓ | ✓ | ✓ |
| VS Code | ✓ | ✓ | ✓ | |
| Claude Desktop / Cowork | ✓ | ✓ | ✓ | |
| Claude Code | ✓ | ✓ | ✓ | ✓ |
| Windsurf | ✓ | ✓ | ✓ | |
| Goose | ✓ | ✓ | ✓ | |
| Zed | ✓ | ✓ | ✓ | |
| OpenCode | ✓ | ✓ | ✓ | ✓ |
| Codex | ✓ | ✓ | ✓ | ✓ |
Shadow Skills Discovery
Detect discovers skill artifacts alongside MCP server configurations in the same scan. Each discovered skill is classified and assigned a risk level based on its content.Skill Classification
| Classification | Description |
|---|---|
| Shadow | Skill installed outside organizational control, not published in Runlayer |
| Managed | Skill published and managed through Runlayer |
| Outdated | Skill was previously managed but the published version has since been updated |
Risk Levels
Skills flagged as High or Medium risk warrant immediate attention from security teams.| Risk Level | Description |
|---|---|
| High | Contains risky instructions — prompt injection, data exfiltration patterns, or unsafe automation |
| Medium | Potentially risky characteristics that warrant review |
| Low | Minor concerns, unlikely to pose a threat |
| Minimal | No concerning patterns detected |
Shadow Plugins Discovery
Detect also discovers installed plugin artifacts alongside MCP servers and skills. Discovered plugins are classified using the same managed/shadow model:| Classification | Description |
|---|---|
| Shadow | Plugin installed outside organizational control, not published in Runlayer |
| Managed | Plugin published and managed through Runlayer |
Deployment
MDM Deployment
Deploy Detect across your organization directly from the Runlayer dashboard:Manual Installation
For testing or individual device setup, run the CLI directly. Install the Runlayer CLI:Custom Integration
Use these modular components to build your own Detect integration when you need custom scheduling or deployment infrastructure. Install the CLI as a tool:Viewing Results
After a scan, view discovered servers, skills, and plugins in the Runlayer dashboard:- Navigate to Analytics
- The Shadow MCP section shows:
- Total devices scanned
- Managed vs. shadow servers
- Newly discovered shadow servers
- The Shadow Skills section shows:
- Shadow skills by risk level (High, Medium, Low, Minimal)
- Skill classification breakdown (Shadow, Managed, Outdated)
- Top repositories with shadow skills
- Skill discovery trends over time
- The Shadow Plugins section shows:
- Managed vs. shadow plugins
- Plugin classification breakdown
Resolving Unmatched Usernames
Detect automatically resolves device usernames to Runlayer users using tiered matching (email, name patterns, etc.). Some usernames may remain unresolved due to typos, missing users, or ambiguous matches. Administrators can manually match these usernames from the dashboard.Find Unresolved Usernames
Scroll to the Unresolved Usernames section below Detect Re-analysis. This section only appears when there are unresolved usernames.
Manual username matches are recorded in the audit log, including the admin who performed the match, the username, the matched user, and the number of devices affected.
Related Resources
Enforce
Block shadow MCP tool calls in real-time
Responding to Discoveries
Security team response framework
Re-analyzing Classifications
Refresh server and skill classifications after changes
Troubleshooting
Common issues and solutions