Back to Home
JoaquimCassano icon

cve-mcp

Verified Safe

by JoaquimCassano

Overview

Provides a tool-based interface to search for and retrieve details about Common Vulnerabilities and Exposures (CVEs) from official sources.

Installation

Run Command
python server.py

Security Notes

The code uses `cloudscraper` to bypass bot detection on `www.cve.org`, which, while not inherently malicious, is an aggressive technique that could lead to operational issues (e.g., IP bans or changes in scraping effectiveness). The `cve_id` is directly interpolated into a URL path in `gather_details` without explicit input validation, though the strict format of CVE IDs reduces the immediate risk of path traversal. Hardcoded user-agent and browser headers are used in network requests, which might require maintenance if external API detection methods change. No 'eval', obfuscation, hardcoded secrets, or other obvious malicious patterns were found. Pydantic models are used for robust data validation and parsing.

Similar Servers

Stats

Interest Score0
Security Score8
Cost ClassHigh
Avg Tokens10000
Stars0
Forks0
Last Update2025-12-14

Tags

CVEVulnerability SearchSecurityAPIData Fetching