kev-mcp
The CISA Vulnerability Checker MCP Server is a Model Control Protocol server that offers real-time access to CISA's Known Exploited Vulnerabilities catalog. It integrates with Claude for enhanced security analysis and provides monitoring and checking of CVEs.
CISA Vulnerability Checker MCP Server
A Model Control Protocol (MCP) server that provides access to CISA's Known Exploited Vulnerabilities (KEV) catalog through Claude and Cursor integration.
MCP Server Functionality
The MCP server provides real-time access to CISA's KEV catalog through Claude and Cursor integration. It enables:
- Real-time CVE checking and monitoring
- Integration with Claude for enhanced security analysis
- Access to the complete CISA KEV catalog
Production Deployment
The MCP server is available at: https://amcipi.com/cisa-kev/
To configure Claude to use the CISA vulnerability checker server, add the following to your Claude configuration file (usually located at ~/Library/Application Support/Claude/claude_desktop_config.json
):
{
"mcpServers": {
"cisa": {
"command": "npx",
"args": [
"mcp-remote",
"https://amcipi.com/cisa-kev/mcp"
]
}
}
}
Installation Options
Option 1: Install from Repository
- Clone this repository:
git clone <repository-url>
cd <repository-name>
- Create a virtual environment (recommended):
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
- Install the package in development mode:
pip install -e .
Option 2: Run Directly from Repository
To run the MCP server directly:
uvicorn cisa_vuln_checker.server:app
This will start the server on the default port (8000).
Option 3: Run with Docker
Build the image:
docker build -t cisa-vuln-checker .
Run the container:
docker run -p 8080:8080 cisa-vuln-checker
API Functionality
REST API Endpoints
- Health Check:
GET /rest/health
- Server Status:
GET /rest/status
- Check CVE:
GET /rest/check-cve?cve_id=CVE-2024-1234
- Recent CVEs:
GET /rest/recent-cves?days=7
- API Documentation:
GET /rest/docs
CLI Commands
Get CVEs from the last 7 days:
cisa-vuln-checker recent-cves --days 7
Get CVEs from the last 24 hours:
cisa-vuln-checker recent-cves --hours 24
Check if a CVE exists:
cisa-vuln-checker check-cve CVE-2023-1234
Development
Running Tests
The project includes integration tests that test the CLI commands. To run the tests:
- Make sure you have the package installed in development mode
- Run the tests:
pytest tests/
The tests will:
- Test getting recent CVEs by days and hours
- Test error handling when no arguments are provided
- Test checking for existing and non-existing CVEs