Skip to main content
Glama

MCP Vulnerability Checker Server

by firetix

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault
DEBUGNoEnable debug modefalse
MCP_USER_AGENTNoCustom User-Agent for HTTP requests
MCP_SERVER_HOSTNoHost to bind the server to0.0.0.0
MCP_SERVER_PORTNoPort to run the server on8000

Schema

Prompts

Interactive templates invoked by user choice

NameDescription

No prompts

Resources

Contextual data attached and managed by the client

NameDescription

No resources

Tools

Functions exposed to the LLM to take actions

NameDescription
cve_lookup

Lookup CVE vulnerability information from the National Vulnerability Database

package_vulnerability_check

Check for known vulnerabilities in Python packages using OSV database

get_epss_score

Get EPSS exploitability prediction score for a CVE

calculate_cvss_score

Calculate CVSS base score from vector string

search_vulnerabilities

Search vulnerability databases with advanced filtering

get_exploit_availability

Check for public exploits and PoCs for a CVE

get_vulnerability_timeline

Get vulnerability timeline and patch status information

get_vex_status

Check VEX vulnerability status for specific products

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/firetix/vulnerability-intelligence-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server