Claude Code Organizer (CCO)
Zero-install npx dashboard that audits what Claude Code loads into context: scans for MCP prompt injection, identifies scope misconfigurations, tracks context token budget, and manages skill/memory scopes. 211 stars.
- Audit what tools and data Claude loads into every session
- Spot security risks in third-party tool configurations
- Track how much of the context budget each tool consumes
MCP server prompt injection is a real and underappreciated enterprise risk. CCO is the only tool combining security scanning, context optimization, and scope management — a compelling governance story for enterprise clients.
Developers and IT admins deploying Claude Code at scale who need visibility into what Claude is loading, especially teams adopting third-party MCP servers.
https://github.com/mcpware/claude-code-organizer
By mcpware
How to Get It
npx @mcpware/claude-code-organizer
Tip: Paste this into a Claude Code conversation. Verify command matches your Claude Code version.
Trust Signals Source Reviewed
Data & Access
Community Pulse Growing
Discussed on Reddit
- bossVibeCodedOnce — Reddit · 2830 pts
- Anthropic Left Its Unreleased AI Model Docs On A Public Server, And The Leaked F — Reddit · 2765 pts
- Claude Code can now /dream — Reddit · 2431 pts
14 mentions across 1 sources
Reviewer notes
Source Reviewed review. These are observations, not a security certification.
184 stars, MIT license, zero telemetry (explicitly stated), 138 passing E2E tests, zero external dependencies. mcpware is an organization. npx zero-install model is excellent for enterprise. Provides the only integrated MCP security scanner + context auditor + scope manager. Strong candidate for every enterprise Claude Code deployment.
Zero telemetry badge and explicit privacy statement: reads only ~/.claude/ directory, no API keys accessed, no conversation content, no external data sent. Zero dependencies — strongest possible supply-chain posture. MIT license. Organization maintainer. 138 E2E tests = professional quality.
2026-04-02: LIMITATION: Pre-1.0. MCP security scanner covers known injection patterns but cannot detect novel or obfuscated prompt injection techniques.
Things to check
- Single maintainer. Consider the risk if this person stops maintaining the project.
How to evaluate tools before deploying →
Data shown here comes from public APIs and automated scanning. Reviewer notes reflect one person's experience. This is not a security certification or legal recommendation. Always evaluate tools according to your own organization's policies.
Evaluation
184 stars, MIT license, zero telemetry (explicitly stated), 138 passing E2E tests, zero external dependencies. mcpware is an organization. npx zero-install model is excellent for enterprise. Provides the only integrated MCP security scanner + context auditor + scope manager. Strong candidate for every enterprise Claude Code deployment.