Integrated MCP scanning, hardening, and real-time MCP Proxy capabilities detect and stop data leakage, prompt injection, and privilege escalation threats ...