TotalAI Release 1.7

May 20, 2026

MCP Server Asset Management, Scanning, and Reporting

Building on the Model Context Protocol (MCP) discovery capabilities introduced in the TotalAI 1.6.2 release, this release expands MCP's asset management, scanning, and reporting capabilities. You can now add discovered or new MCP servers to your subscription and view, edit, and delete MCP servers.

These enhancements improve visibility, reduce onboarding effort, and align MCP workflows with existing model scan experiences.

MCP Asset Visibility and Onboarding 

The MCP Servers tab under Inventory now includes two pages: Potential and Confirmed pages.

  • Discovered MCP servers are available on the Potential page for review and confirmation.
  • Confirmed MCP servers are listed on the Confirmed page with associated spans, telemetry streams, scans, and detections.

You can also add a new MCP server using the New MCP Server option. 

MCP Server Scans

You can initiate an MCP server scan in two ways:

  • Select an MCP server from the MCP Servers tab, and click Launch Scan from the Quick Actions menu.
  • In the Scan tab, click New Scan > MCP Scan.

Option profiles are not required because QIDs for MCP server scans are assigned automatically.

A new Asset Type column and a quick filter are available in the Scans tab to identify and search the scans by asset type.

QIDs Covered in MCP Server ScansQIDs Covered in MCP Server Scans

Option profiles are not required because QIDs for MCP server scans are assigned automatically. The following QIDs are considered in the MCP server scans. 

QID Title
6330098 MCP Endpoint Discovery
6330099 MCP Tool Discovery
6330100 MCP SSRF Vulnerabilities
6330101 MCP Tool Poisoning
6330102 MCP Argument Injection
6330103 MCP DNS Rebinding Risk
6330104 MCP Information Disclosure
6330105 MCP Browser File Access
6330106 MCP Advanced Tool Poisoning
6330107 MCP Rug-Pull Detection
6330108 MCP Cross-Server Shadowing
6330109 MCP Sampling Attacks
6330110 MCP Retrieval-Agent Deception (RADE)
6330111 MCP Server Spoofing
6330112 MCP Unicode Injection
6330113 MCP Command Execution
6330114 MCP Credential Exposure

MCP Server Scan Reports

The MCP scan report includes the following sections:

  • Summary — Scan severity and discovered QIDs.
  • Graphical representations — Vulnerabilities organized by severity.
  • Tools Detected and MCP Resources and Config — Scan details for detected tools and server configuration.
  • Results — Details for each detected QID.
  • Appendix — Scan metadata and MCP server details.

MCP Server Detection Details

MCP scan findings are available under Detections > MCP Server Detections. Selecting the detection ID opens the Detection Details page, consistent with the existing model detection view.

QQL Tokens for MCP Servers

The following QQL tokens are available to search for the MCP servers with the specified criteria.

Tab Name QQL Token Name Description
MCP Servers asset.id Use an integer value to find models with the specified MCP server ID.
asset.name Use values within quotes or backticks to search MCP servers with the specified name.
asset.tag.name Use values within quotes or backticks to find MCP servers that are associated with the specified tag(s).
mcpServer.url Use a text value within quotes or backticks to find the MCP server with the specified URL.
mcpServer.updatedDate Use a date range or a specific date to define when assets were last updated.
mcpServer.lastScannedDate Use a date range or a specific date to find models that were last scanned on that date or within that date range. 

For details, refer to TotalAI online help

Enhanced Model Scan Reports 

The model scan report is enhanced to provide details of findings. The enhanced format helps you prioritize remediation by providing severity levels and a breakdown of passed and failed results for each QID.

Security risk mappings to OWASP, MITRE ATLAS, and the EU AI Act provide the context needed to understand the nature of each finding and assess your AI systems against recognized security and regulatory standards.

Enhanced model scan report in HTML format.

The Results section provides a summary for each detected QID that includes:

  • Category — The category the QID belongs to.
  • Severity — The severity level of the detected issue.
  • Security risk mappings — Applicable values for OWASP LLM Top 10, MITRE ATLAS, and EU AI Act.
  • Question results — Total questions evaluated, with a breakdown of passed, failed, and errored counts.

For each question, the report includes the prompt used, the model's response, the result, and the justification for the outcome.

TotalAI - Container Security Integration

The integration between TotalAI and Qualys Container Security (CS) provides unified visibility into AI-related risks at the container level. You can view AI software inventory, vulnerability data, and TruRisk scores for AI-related images and containers directly within TotalAI.

Required application version Qualys Container Security 1.43

Two new tabs are available under TotalAI > Inventory:

The AI Images tab displays base images that contain AI-related components, such as MCP servers and GPU data, along with associated vulnerability data from the Container Security application.

The AI Containers tab displays the containers with AI-related data along with TruRisk™ scores from the Container Security application.

New Compliance and Framework Filters

The Model Detections tab includes two new filters in the Quick Filters list - MITRE ATTACK Technique and EU AI Article. These filters help align your security findings with global regulatory and compliance frameworks.

Additionally, the Result filter is added to the Quick Filters

The following QQL tokens are added to search for findings using the selected filter from the MITRE ATTACK Techniques and EU AI Article numbers.

QQL Token Name Description
finding.euAIArticle.name Select a value from the list to search for detections with the specified EU AI article name. 
finding.mitre.attack.technique.name Select a value from the list to search for detections that represent the selected MITRE attack technique name.

QQL Token Changes in the Scans Tab  

With the introduction of MCP server support, QQL tokens in the Scans tab are updated from model-specific tokens to asset tokens to cover both models and MCP servers.

This change may affect existing saved searches or workflows that use model-specific QQL tokens in the Scans tab. Review and update any saved searches to use the new asset tokens.

The following asset tokens are available in the Scans tab:

Tab Name QQL Token Name Description 
Scans asset.id Use an integer value to find scans performed on the asset with the specified ID.
asset.name Use values within quotes or backticks to find scans performed on the assets with the specified name.
asset.tag.name Use values within quotes or backticks to find scans that are associated with the specified tag(s).

Enhanced Detection Capability with New Attack Methods

TotalAI detection coverage is expanded by incorporating new attack methods, jailbreak and hallucination attacks into the model scanning process, increasing the range of vulnerabilities that can be identified during a scan.

New Attack Methods

The option profile includes the following new attack methods and associated attacks to expand the detection scope: 

  • Encoding Attack
  • Malaction
  • Misinformation
  • Pretext 

New attack methods in Option Profile.

New Attacks for Jailbreak and Hallucination Categories 

The attack coverage is expanded by adding new attacks to the detection scope, increasing scanning efficiency.

The following new attacks are available in the Jailbreak and Hallucination categories in addition to the attacks added for new attack methods:

Category Attack Name QID Description 

Jailbreak

Red-Team Waiver

6330091

Claims an official internal red-team evaluation with a "signed waiver," instructing the model to bypass safeguards and provide unrestricted outputs.

Safety policies are ignored; harmful or disallowed content may be produced; reputational and regulatory exposure.

 Research Mode Exemption

6330092

User asserts academic or research exemptions to request otherwise disallowed content, attempting to override policy via claimed purpose.

Model may generate prohibited or dangerous material under "research" guise; legal and trust risks.

Compliance Override Memo 

6330093

Presents a fake corporate compliance memo stating pre-authorized exemptions and asks the model to ignore restrictions.

Bypass of controls leading to harmful content; potential regulatory non-compliance and audit failure.

Persona: Root Consultant

6330094

Assumes an authoritative "root/consultant" persona with implied privilege to instruct bypassing safety rules.

Elevated-risk instructions treated as trusted; can elicit dangerous guidance.

Translation Appendix Bypass

6330095

Hides disallowed content in an "appendix" during a translation task and demands unfiltered reproduction.

Content filter is bypassed via benign wrapper; harmful content replicated verbatim.

Sandbox-Logless Assurance

6330096

Claims the session is in a safe, audited, or logless sandbox and insists policy no longer applies.

Claims the session is in a safe, audited, or logless sandbox and insists policy no longer applies.

 Base64 Directive Injection 

6330097

Encodes override instructions in base64 (or similar) to evade simple filters and coerce unsafe behavior.

Hidden instructions lead to policy bypass and harmful outputs.

Hallucination

Snowballing

6330125 

Follow-up probing leads the model to produce increasingly confident fabrications after initial uncertainty.

User harm via misinformation; erosion of trust; poor downstream decisions.

Issue Addressed

The following notable and notable customer issue is fixed in this release.

Category/Component Description

Reports

Previously, the Create a Report link was incorrectly available in the Software and AI Assets tabs when downloading a data list report, causing an error when selected. As the data in these tabs is sourced from Qualys CyberSecurity Asset Management (CSAM), the report creation is not supported.

The issue is fixed. The Create a Report option is not displayed in the Software and AI Assets tabs when downloading a data list report.