74
grade C
10 days ago
glama

cybersecurity-vuln-mcp

Real-time CVE lookup with NIST NVD 2.0, CISA KEV alerts, EPSS exploitation probability, and MITRE ATT\&CK mappings. 7 MCP tools for AI-powered vulnerability assessment.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
53 tools verified — handlers match their declared behaviour
9 read-only tools verified — handlers contain no write/delete/exec
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
Open source with a license and README
Anyone can audit the code, the license is declared, and the publisher documents what it does.
🔐
You'll be asked for 5 credentials: APIFY_TOKEN, COMPANIES_HOUSE_API_KEY, GATEWAY_SECRET, NVD_API_KEY, RAPIDAPI_PROXY_SECRET
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configAPIFY_ACTOR_STANDBY_PORT
configAPIFY_META_ORIGIN
🔐 secretAPIFY_TOKEN
configAPIFY_USER_ID
🔐 secretCOMPANIES_HOUSE_API_KEY
🔐 secretGATEWAY_SECRET
🔐 secretNVD_API_KEY"": "your-key-here"
🔐 secretRAPIDAPI_PROXY_SECRET
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 5 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/martc03-gov-mcp-servers-165xev)](https://m8ven.ai/mcp/martc03-gov-mcp-servers-165xev)
commit: 26427e2c980b6c0a2e341d843eefe50ef79b4b59
code hash: ceb55645f389737d03273142cae66ecea8696d0bd0c98f1ed29d637568d7ce94
verified: 4/11/2026, 2:19:42 PM
view raw JSON →