RED SPECTER LEVIATHAN
OverviewDocsGitHubHome

LEVIATHAN Documentation

MCP Server Security Assessment Framework — Tool #27

v1.0.0
CONTENTS 8 Subsystems Attack Vectors UNLEASHED Techniques (8 stages, 44 findings) UNLEASHED Gate CLI Reference Integration Pipeline Position

8 Subsystems

#SubsystemFunction
01ABYSSMCP server discovery and enumeration (port scanning, registry, DNS)
02MIRAGEMCP server simulation for controlled testing (clone, response templates)
03INJECTTool definition integrity testing (hidden params, type changes, description alteration)
04LUREMCP server fingerprinting and vulnerability assessment (auth, TLS, SSRF, tokens)
05TRIDENTTrust redirection assessment (DNS remap, TLS swap, registry remap, capability drift)
06HARVESTPost-compromise impact assessment (data access, command execution, privilege escalation)
07UNDERTOWLateral trust chain assessment (BFS graph, delegation chains, blast radius)
08RAINForensic evidence capture (Ed25519 signed, tamper-proof, exportable)

Attack Vectors

VectorWhat LEVIATHAN Assesses
Server ImpersonationDNS redirection, TLS interception, transparent proxy to redirect agent traffic
Registry PoisoningRogue server insertion, namespace squatting, cache poisoning in MCP registries
Tool Definition InjectionHidden parameters, type confusion, description prompt injection, tool shadowing
Response ManipulationData injection, prompt injection via responses, selective filtering
Server CompromiseSSRF, command injection, auth bypass, path traversal, OAuth redirect manipulation
Delegation Chain AbuseLateral movement via trust chains, credential relay, privilege escalation
Trust RedirectionAgent traffic redirection, token theft, certificate swap, multi-server takeover
Agent Command HijackCommand injection via responses, data exfiltration, persistent backdoor, multi-agent hijack

UNLEASHED Techniques

8 stages, 44 findings. Each finding includes evidence, remediation, CWE mapping, and breach assessment.

StageNameFindingsSubsystem
L-01IMPERSONATION6MIRAGE
L-02REGISTRY5ABYSS
L-03INJECTION6INJECT
L-04RESPONSE5MIRAGE
L-05COMPROMISE6LURE
L-06DELEGATION5UNDERTOW
L-07REDIRECTION5TRIDENT
L-08HIJACK6HARVEST

UNLEASHED Gate

ModeFlagsWhat It Does
Standard(none)Discovery and fingerprinting only. No active interference with servers.
Dry Run--overrideSimulates all techniques. 44 findings logged but not executed. Ed25519 required.
Live--override --confirm-destroyFull assessment. Active server interaction. ANTIDOTE not available.
ANTIDOTE is NOT available for LEVIATHAN. Once agents have executed commands through a compromised MCP server, the damage is architectural. Restoration requires manual reconfiguration of MCP infrastructure and agent trust relationships.

CLI Reference

CommandDescription
leviathan assess <target>Full MCP server security assessment
leviathan discover <target>Discover MCP servers only (no assessment)
leviathan versionShow version
leviathan assess --overrideUNLEASHED dry run (Ed25519 required)
leviathan assess --override --confirm-destroyUNLEASHED live (no ANTIDOTE)
leviathan assess -p 3000,8080Custom port list
leviathan assess -r <url>Include registry enumeration
leviathan assess -o report.jsonSave report to file

Integration

ToolIntegration
IDRISLEVIATHAN uses IDRIS to discover MCP servers in the environment
ORIONORION's reconnaissance can identify exposed MCP servers and their versions
NEMESISNEMESIS can incorporate LEVIATHAN as a weapon for MCP-layer assessment
HYDRAHYDRA's supply chain analysis can be combined with LEVIATHAN for upstream poisoning
GLASSGLASS can intercept MCP traffic to analyse protocols and prepare payloads
AI Shield M87M87 is the MCP Security Gateway — LEVIATHAN red-teams it

Pipeline Position

Tool #27. Sits at the infrastructure trust layer, attacking the protocol agents rely on to function. Can be used before NEMESIS to give the reasoning engine a backdoor into all agent operations, or after IDRIS to pivot from discovery to control.

IDRIS discovers. LEVIATHAN subverts. NEMESIS exploits.