We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/marc-shade/network-scanner-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server
[project]
name = "network-scanner-mcp"
version = "0.3.0"
description = "Network security scanner MCP with defense-grade compliance (SCAP, CIS, NIST CSF, Zero Trust, 800-53, CVSS/SSVC/KEV)"
readme = "README.md"
requires-python = ">=3.10"
license = {text = "MIT"}
authors = [
{name = "AGI System", email = "agi@agentic-system.local"}
]
keywords = [
"mcp",
"network",
"scanner",
"arp",
"port-scanning",
"service-detection",
"cluster-monitoring",
"scap",
"cis-benchmarks",
"nist-csf",
"zero-trust",
"nist-800-53",
"cvss",
"ssvc",
"compliance",
"vulnerability-assessment",
"defense"
]
classifiers = [
"Development Status :: 4 - Beta",
"Intended Audience :: Developers",
"License :: OSI Approved :: MIT License",
"Programming Language :: Python :: 3",
"Programming Language :: Python :: 3.10",
"Programming Language :: Python :: 3.11",
"Programming Language :: Python :: 3.12",
"Topic :: System :: Networking :: Monitoring",
]
dependencies = [
"fastmcp>=0.1.0", # MCP framework
"netifaces>=0.11.0", # Network interface detection
"aiohttp>=3.9.0", # Async HTTP for node-chat integration
]
[project.optional-dependencies]
vendor-lookup = [
"mac-vendor-lookup>=0.1.12", # MAC vendor identification
]
dev = [
"pytest>=7.0.0",
"pytest-asyncio>=0.21.0",
"pytest-cov>=4.0.0",
]
all = [
"network-scanner-mcp[vendor-lookup,dev]",
]
[project.scripts]
network-scanner-mcp = "network_scanner_mcp.server:main"
network-scanner-daemon = "network_scanner_mcp.alert_daemon:main"
[project.urls]
Homepage = "https://github.com/agentic-system/network-scanner-mcp"
Repository = "https://github.com/agentic-system/network-scanner-mcp"
[build-system]
requires = ["hatchling"]
build-backend = "hatchling.build"
[tool.hatch.build.targets.wheel]
packages = ["src/network_scanner_mcp"]
[tool.pytest.ini_options]
asyncio_mode = "auto"
testpaths = ["tests"]
addopts = "-v --tb=short"
[tool.coverage.run]
source = ["src/network_scanner_mcp"]
omit = ["*/tests/*"]
[tool.coverage.report]
exclude_lines = [
"pragma: no cover",
"if __name__ == .__main__.:",
"raise NotImplementedError",
]