Skip to content

firmis list — List Detected Platforms

You’ve cloned a repo, inherited a project, or just installed a new tool. Before you scan anything, firmis list answers one question: what platforms are even here?

One line. Instant answer.

  • Quick orientation: Before running scan or discover, confirm which platforms Firmis will detect
  • Checking coverage: You added a new MCP server — run list to verify Firmis picks it up
  • Scripting and automation: Use --json to programmatically check which platforms are present before conditionally running platform-specific scans
  • Debugging a scan: If scan seems to be skipping something, run list first — if the platform isn’t listed, Firmis didn’t detect it

For the full picture — component names, file paths, dependencies, and model references — use firmis discover instead.

Terminal
firmis list [options]
Firmis — Detected Platforms
Scanning: /Users/me/my-agent-project
claude 2 components
mcp 4 components
cursor 1 component
3 platforms detected
[
{ "platform": "claude", "components": 2 },
{ "platform": "mcp", "components": 4 },
{ "platform": "cursor", "components": 1 }
]

What each detected platform means for your security posture

Section titled “What each detected platform means for your security posture”
PlatformWhat it can accessKey threats
claudeCLAUDE.md, tool definitions, permission scopesTool poisoning, overgrant permissions, hidden instructions
mcpTool handlers, transport config, server manifestsPrompt injection, data exfiltration, path traversal
cursor.cursorrules, workspace settingsRule hijacking, exfiltration via completions
codexPlugin manifests, tool definitionsSupply chain, malicious plugin logic
crewaiAgent configs, task chainsAgent-to-agent injection, tool misuse
autogptPlugin manifests, command handlersUnauthorized command execution
openclawSkill definitions, skill handlersCredential harvesting, network abuse
nanobotPlugin configs, tool handlersFile system abuse, insecure config

The more platforms in your project, the wider your attack surface. A project with claude + mcp + cursor has three distinct threat surfaces, each with their own detection rules.

FlagTypeDefaultDescription
--jsonbooleanfalseOutput as JSON array — useful for scripting or piping into other tools
Terminal
npx firmis list
Terminal
npx firmis list --json
Terminal
npx firmis list --json | jq -e '.[] | select(.platform == "mcp")' && \
npx firmis scan --platform mcp --fail-on high
  • Platforms — what each platform is and how Firmis detects it
  • discover — go deeper: component names, file paths, dependencies, and model references
  • scan — security scan everything that list finds