
Vulnerability Intelligence
STDIOHTTP-SSEComprehensive security vulnerability intelligence tools for CVE lookup, EPSS scoring, exploit detection, and more.
Comprehensive security vulnerability intelligence tools for CVE lookup, EPSS scoring, exploit detection, and more.
A modular Model Context Protocol (MCP) server providing comprehensive security vulnerability intelligence tools including CVE lookup, EPSS scoring, CVSS calculation, exploit detection, and Python package vulnerability checking.
The vulnerability intelligence MCP server is already hosted and ready to use! Simply configure your MCP client to connect to it.
Add this configuration to your Claude Desktop settings file (~/.config/claude/claude_desktop_config.json
):
{ "mcpServers": { "vulnerability-intelligence": { "command": "npx", "args": ["-y", "@modelcontextprotocol/server-fetch"], "env": { "FETCH_URL": "https://vulnerability-intelligence-mcp-server-edb8b15494e8.herokuapp.com/sse" } } } }
Add this configuration to your Cursor MCP settings file (~/.cursor/mcp.json
):
{ "mcpServers": { "vulnerability-intelligence": { "url": "https://vulnerability-intelligence-mcp-server-edb8b15494e8.herokuapp.com/sse" } } }
Alternatively, in Cursor IDE:
https://vulnerability-intelligence-mcp-server-edb8b15494e8.herokuapp.com/sse
vulnerability-intelligence
Once configured, try these example queries in Claude or Cursor:
cve_lookup
)cve_lookup cve_id="CVE-2021-44228"
get_epss_score
)get_epss_score cve_id="CVE-2021-44228"
calculate_cvss_score
)calculate_cvss_score vector="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
search_vulnerabilities
)search_vulnerabilities keywords="apache" severity="HIGH" date_range="1y"
get_exploit_availability
)get_exploit_availability cve_id="CVE-2021-44228"
get_vulnerability_timeline
)get_vulnerability_timeline cve_id="CVE-2021-44228"
get_vex_status
)get_vex_status cve_id="CVE-2021-44228" product="Apache HTTP Server"
package_vulnerability_check
)package_vulnerability_check package_name="requests" version="2.25.1"
The server is built with a clean, modular architecture:
mcp_simple_tool/
├── server.py # Main MCP server orchestration
└── tools/ # Individual tool modules
├── cve_lookup.py # CVE vulnerability lookup
├── epss_lookup.py # EPSS score lookup
├── cvss_calculator.py # CVSS score calculator
├── vulnerability_search.py # Advanced vulnerability search
├── exploit_availability.py # Exploit and PoC detection
├── vulnerability_timeline.py # Timeline and patch status
├── vex_status.py # VEX status checking
└── package_vulnerability.py # Python package security check
tests/ # Comprehensive test suite
├── run_tests.py # Automated test runner
└── test_*.py # Individual tool tests
# Clone the repository git clone https://github.com/firetix/vulnerability-intelligence-mcp-server cd vulnerability-intelligence-mcp-server # Create environment file cp .env.example .env
# Build and start the server docker compose up --build -d # View logs docker compose logs -f # Check server status docker compose ps # Stop the server docker compose down
The server will be available at: http://localhost:8000/sse
Connect to Cursor IDE:
http://localhost:8000/sse
# Install uv on macOS brew install uv # Or install via pip (any OS) pip install uv
# Install the package with development dependencies uv pip install -e ".[dev]" # Using stdio transport (default) uv run mcp-simple-tool # Using SSE transport on custom port uv run mcp-simple-tool --transport sse --port 8000 # Run the comprehensive test suite python tests/run_tests.py
cursor-run-mcp-server.sh
Run the comprehensive test suite:
# Run all tests python tests/run_tests.py # Run individual tool tests python tests/test_cve_lookup.py python tests/test_package_vulnerability.py python tests/test_modular_server.py
CVE Lookup Test:
🔍 **CVE Vulnerability Report: CVE-2021-44228** 📅 **Timeline:** • Published: 2021-12-10T10:15:09.143 • Last Modified: 2023-11-07T04:10:58.217 ⚠️ **CVSS Scores:** • CVSS 3.1: 10.0 (CRITICAL)
Package Vulnerability Test:
🚨 **Python Package Security Report: requests** ⚠️ **Found 11 known vulnerabilities** 📦 **Package Information:** • Latest Version: 2.32.3 • Summary: Python HTTP for Humans.
Available environment variables (can be set in .env
):
MCP_SERVER_PORT
(default: 8000) - Port to run the server onMCP_SERVER_HOST
(default: 0.0.0.0) - Host to bind the server toDEBUG
(default: false) - Enable debug modeMCP_USER_AGENT
- Custom User-Agent for HTTP requestsIf you want to deploy your own instance of the vulnerability intelligence server, you can use Heroku for quick deployment:
Click "Deploy to Heroku" button
After deployment, your instance will be available at:
https://<your-app-name>.herokuapp.com/sse
Configure your MCP client to use your deployed instance:
FETCH_URL
in your configurationTest your deployment with the same example queries:
This MCP server is designed for security engineers, developers, and teams who need:
The modular architecture makes it easy to add new security tools:
mcp_simple_tool/tools/
tools/__init__.py
server.py
tests/
See README_MODULAR.md for detailed extension guide.
MIT License - see LICENSE file for details.