Skip to main content
Glama

Risky Business MCP Server

by khizar-anjum

Risky Business AI MCP Server

A comprehensive Model Context Protocol (MCP) server for cybersecurity vulnerability assessment, providing tools to search GitHub repositories, query NIST NVD, access CISA's Known Exploited Vulnerabilities catalog, and analyze repository contents for CVE research and proof-of-concept discovery.

📹 Demo

Demo

Watch Full Demo Video (MP4)

Demo Workflow

The demo demonstrates a complete vulnerability assessment for CVE-2025-53770:

  1. Validate CVE-2025-53770 and retrieve severity information from NIST
  2. Analyze business impact by checking company asset inventory
  3. Check for active exploitation in CISA KEV database
  4. Search for proof-of-concept exploits on GitHub
  5. Generate executive dashboard with findings
  6. Create and deliver voice briefing
  7. Send summary to Beeper chat

Sample Alert Message (Sent via Beeper)

🚨 CRITICAL SECURITY ALERT - CVE-2025-53770 🚨 Severity: CRITICAL (CVSS 9.8) Status: ⚠️ ACTIVELY EXPLOITED IN THE WILD Company Impact: 🔴 AFFECTED • Asset: PROD-SP-01 (SharePoint Server 2019 Enterprise) • Environment: Production • Criticality: High Threat Intelligence: • Listed in CISA KEV with known ransomware usage • Multiple proof-of-concept exploits publicly available on GitHub • Vulnerability allows unauthenticated remote code execution • This is a patch bypass for CVE-2025-49704 Immediate Actions Required: ✓ Apply Microsoft security updates IMMEDIATELY ✓ If updates cannot be applied, disconnect SharePoint from network ✓ Monitor for suspicious activity in SharePoint logs ✓ Review CISA mitigation guidance Technical Details: • CWE-502: Deserialization of Untrusted Data • Affects SharePoint 2016, 2019, and Subscription Edition • Exploitation requires network access only (no authentication) ⏰ Due Date: July 21, 2025 (per CISA BOD 22-01) Voice briefing has been generated. Please take immediate action to protect company assets.

🛠️ Tools

search_github_repositories

Search GitHub repositories using the GitHub API.

Parameters:

  • query (string, required): Search query with keywords and qualifiers
  • sort (string, optional): Sort by "stars", "forks", "help-wanted-issues", "updated", or "best-match" (default)
  • order (string, optional): "desc" (default) or "asc"
  • per_page (integer, optional): Results per page, 1-100 (default: 5)
  • page (integer, optional): Page number (default: 1)

get_cve_from_nist

Query NIST National Vulnerability Database for CVE details.

Parameters:

  • cve_id (string, required): CVE identifier (e.g., "CVE-2023-1234" or "2023-1234")

Returns: CVSS scores, severity ratings, CWE mappings, affected products (CPE), and references.

search_kev

Search CISA's Known Exploited Vulnerabilities catalog.

Parameters:

  • query (string, required): Search term (CVE ID, vendor, product, or keyword)
  • field (string, optional): Field to search - "all", "cve_id", "vendor", "product", "vulnerability_name", "date_added" (default: "all")
  • max_results (integer, optional): Maximum results 1-50 (default: 10)

Returns: Matching KEV entries with exploitation details and ransomware campaign indicators.

list_github_repository_files

List all files in a GitHub repository.

Parameters:

  • repo_url (string, required): GitHub repository URL (e.g., "https://github.com/owner/repo")
  • branch (string, optional): Branch name (default: "main")

Returns: Complete file tree with paths, types, and SHA hashes.

get_github_file_content

Retrieve specific file content from a GitHub repository.

Parameters:

  • repo_url (string, required): GitHub repository URL
  • file_path (string, required): Path to file (e.g., "src/exploit.py")
  • branch (string, optional): Branch name (default: "main")

Returns: File content (text or binary indicator) with metadata.

📝 Prompts

Generate targeted search strategies for specific CVE numbers.

Parameters:

  • cve_number (string, required): CVE identifier (e.g., "CVE-2023-1234")
  • include_poc (boolean, optional): Include PoC-specific terms (default: true)

advanced_cve_search_strategies

Comprehensive guide for advanced CVE repository searching techniques.

📊 Resources

kev://cisa/catalog

Access the complete CISA Known Exploited Vulnerabilities catalog with active exploitation data.

assets://company/inventory

Company asset inventory for vulnerability impact assessment, including environment, criticality, and vendor information.

🚀 Quick Start

Prerequisites

  • Python 3.8+
  • uv (recommended) or pip
  • Optional: GitHub Personal Access Token for higher API rate limits
  • Optional: NIST API Key for increased rate limits

Installation

  1. Clone the repository
git clone https://github.com/khizar-anjum/risky-business-mcp.git cd risky-business-mcp
  1. Set up Python virtual environment
# Create a virtual environment python3 -m venv venv # Activate the virtual environment # On Linux/macOS: source venv/bin/activate # On Windows: # venv\Scripts\activate # Install dependencies pip install -r requirements.txt
  1. Optional: Set up API authentication
# GitHub Personal Access Token from https://github.com/settings/tokens export GITHUB_TOKEN="your_github_token_here" # NIST API Key from https://nvd.nist.gov/developers/request-an-api-key export NIST_API_KEY="your_nist_api_key_here"

Running the Server

With virtual environment activated:

# Make sure the virtual environment is activated source venv/bin/activate # Linux/macOS # or # venv\Scripts\activate # Windows # Run the MCP server python main.py

Development mode (with MCP Inspector):

# With venv activated mcp dev main.py

Claude Desktop Integration

Add the server to your Claude Desktop configuration:

macOS/Linux:

code ~/Library/Application\ Support/Claude/claude_desktop_config.json

Windows:

code %APPDATA%\Claude\claude_desktop_config.json

Configuration:

{ "mcpServers": { "risky-business": { "command": "/absolute/path/to/risky-business-mcp/venv/bin/python", "args": [ "/absolute/path/to/risky-business-mcp/main.py" ], "env": { "GITHUB_TOKEN": "your_github_token_here", "NIST_API_KEY": "your_nist_api_key_here" } } } }

Environment Variables

VariableDescriptionRequired
GITHUB_TOKENGitHub Personal Access Token for authenticationNo (but recommended)
NIST_API_KEYNIST NVD API key for increased rate limitsNo (optional)

🤝 Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Add tests if applicable
  5. Submit a pull request

📄 License

This project is licensed under the MIT License - see the LICENSE file for details.


Disclaimer: This tool is for legitimate security research and educational purposes. Users are responsible for ensuring their use complies with applicable laws and GitHub's terms of service.

-
security - not tested
F
license - not found
-
quality - not tested

remote-capable server

The server can be hosted and run remotely because it primarily relies on remote services or has no dependency on the local environment.

Enables comprehensive cybersecurity vulnerability assessment by searching GitHub repositories for exploits, querying NIST NVD for CVE details, and accessing CISA's Known Exploited Vulnerabilities catalog. Supports complete vulnerability research workflows from threat intelligence gathering to proof-of-concept discovery.

  1. 📹 Demo
    1. Demo Workflow
    2. Sample Alert Message (Sent via Beeper)
  2. 🛠️ Tools
    1. search_github_repositories
    2. get_cve_from_nist
    3. search_kev
    4. list_github_repository_files
    5. get_github_file_content
  3. 📝 Prompts
    1. cve_repository_search
    2. advanced_cve_search_strategies
  4. 📊 Resources
    1. kev://cisa/catalog
    2. assets://company/inventory
  5. 🚀 Quick Start
    1. Prerequisites
    2. Installation
    3. Running the Server
    4. Claude Desktop Integration
    5. Environment Variables
  6. 🤝 Contributing
    1. 📄 License

      Related MCP Servers

      • A
        security
        A
        license
        A
        quality
        A security testing tool that enables automated vulnerability detection including XSS and SQL injection, along with comprehensive browser interaction capabilities for web application penetration testing.
        Last updated -
        12
        1,346
        17
        JavaScript
        MIT License
      • A
        security
        A
        license
        A
        quality
        Provides GitHub data analysis for repositories, developers, and organizations, enabling insights into open source ecosystems through API calls and natural language queries.
        Last updated -
        5
        13
        JavaScript
        MIT License
      • -
        security
        A
        license
        -
        quality
        A comprehensive system that helps organizations track, manage, and respond to security vulnerabilities effectively through features like vulnerability tracking, user management, support tickets, API key management, and SSL certificate management.
        Last updated -
        Python
        MIT License
      • -
        security
        A
        license
        -
        quality
        A server that retrieves CVE details from the NVD API and fetches EPSS scores to provide comprehensive vulnerability information, including descriptions, CWEs, CVSS scores, and exploitation likelihood percentiles.
        Last updated -
        11
        Python
        MIT License

      View all related MCP servers

      MCP directory API

      We provide all the information about MCP servers via our MCP API.

      curl -X GET 'https://glama.ai/api/mcp/v1/servers/khizar-anjum/risky-business-mcp'

      If you have feedback or need assistance with the MCP directory API, please join our Discord server