Back to Home
guacsec icon

trustify-mcp

Verified Safe

by guacsec

Overview

Acts as an MCP (Model Context Protocol) server, exposing Trustify instance's security vulnerability and SBOM data as structured tools for AI agents.

Installation

Run Command
API_URL=<API URL> OPENID_ISSUER_URL=<OpenID Issuer URL> OPENID_CLIENT_ID=<OpenID Client ID> OPENID_CLIENT_SECRET=<OpenID Client secret> cargo run --release --bin streamable

Environment Variables

  • API_URL
  • OPENID_ISSUER_URL
  • OPENID_CLIENT_ID
  • OPENID_CLIENT_SECRET
  • AUTH_DISABLED
  • RUST_LOG

Security Notes

The server securely handles sensitive information (API URLs, OpenID credentials) by requiring them to be provided via environment variables, preventing hardcoding. Authentication is robustly implemented using the `trustify-auth` library and OpenID Connect for token validation. A `AUTH_DISABLED=true` environment variable exists for development purposes; enabling this in a production environment would bypass critical authentication and pose a severe security risk. URL construction for interacting with the Trustify API directly utilizes user-provided strings for path components (e.g., SBOM URIs). While `reqwest` handles some aspects of URL safety, the server relies on the Trustify backend to fully validate these URIs against potential path traversal or injection, rather than performing its own explicit exhaustive sanitization on these segments.

Similar Servers

Stats

Interest Score34
Security Score8
Cost ClassMedium
Avg Tokens1000
Stars4
Forks4
Last Update2026-01-16

Tags

MCPAI AgentRustTrustifyAPI Integration