Enables searching for vulnerabilities related to Red Hat products in the NVD database using keyword search functionality
NVD Database MCP Server
A Model Context Protocol server implementation to query the NIST National Vulnerability Database (NVD) via its API. https://nvd.nist.gov/
As a prerequisite an NVD API key is required. (Request here).
Status
Works with Claude Desktop app and other MCP compliant hosts and clients using both the stdio and sse transports.
Features
Query specific CVEs by ID with detailed vulnerability data.
Search the NVD database by keyword with customizable result options.
Supports Server-Sent Events (SSE) transport for real-time communication.
Compatible with MCP-compliant clients like Claude Desktop.
Tools
The server implements the following tools to query the NVD Database:
get_cve:Description: Retrieves a CVE record by its ID.
Parameters:
cve_id(str): The CVE ID (e.g.,CVE-2019-1010218).concise(bool, defaultFalse): IfTrue, returns a shorter format.
Returns: Detailed CVE info including scores, weaknesses, and references.
search_cve:Description: Searches the NVD database by keyword.
Parameters:
keyword(str): Search term (e.g.,Red Hat).exact_match(bool, defaultFalse): IfTrue, requires an exact phrase match.concise(bool, defaultFalse): IfTrue, returns shorter CVE records.results(int, default10): Maximum number of CVE records (1-2000).
Returns: List of matching CVEs with total count.
Configuration
Create or edit the Claude Desktop configuration file located at:
On macOS:
~/Library/Application Support/Claude/claude_desktop_config.jsonOn Windows:
%APPDATA%/Claude/claude_desktop_config.json
Add the following:
Replace
/path/to/uvxwith the absolute path to theuvxexecutable. Find the path withwhich uvxcommand in a terminal. This ensures that the correct version ofuvxis used when starting the server.Restart Claude Desktop to apply the changes.
Development
Setup
Prerequisites:
Python 3.10 or higher.
An NVD API key (request here).
uvpackage manager (installation).
Clone the Repository:
Set Environment Variables:
Create a
.envfile in the project root:NVD_API_KEY=your-api-keyReplace
your-api-keywith your NVD API key.
Install Dependencies:
Run with the MCP Inspector
Then open the browser to the URL indicated by the MCP Inspector, typically http://localhost:8077?proxyPort=8078
Switch freely between
stdioandssetransport types in the inspector.
Testing with the SSE Client
Run the Server:
Runs with SSE transport on port
9090by default.
Run the Client:
Test get_cve:
Test search_cve (default 10 results):
Test search_cve (exact match, 5 results):
Docker Setup
Build
Run
With .env:
With env var:
Custom port:
Verify
Test:
Notes
Ensure
.envhasNVD_API_KEY=your-keyor use-e.Default port:
9090.
Here’s the summary formatted as Markdown comments within a code block, suitable for inclusion in a file like docker-compose.yaml or README.md:
Using Docker Compose for Testing
This docker-compose.yaml, located in the tests/ directory, defines a service for testing the MCP-NVD server using a pre-built Docker image. It’s designed for a testing use case, similar to a standalone service like clickhouse, and assumes the image is built beforehand rather than rebuilt each time.
Assumptions
Pre-built Image: The service uses a pre-built image tagged as
mcp-nvd:test, available locally or in a registry. The image is based on theDockerfilein the parent directory, which sets up the MCP-NVD server withuvand runs it in SSE mode on port 9090.
How to Build the Image
To create the mcp-nvd:test image:
Navigate to the project root:
cd ./mcp-nvdBuild the image using the Dockerfile:
docker build -t mcp-nvd:test .This builds the image with all dependencies from
pyproject.tomland themcp_nvd/module, setting the default command to run the server.
Running the Service
From the tests/ directory:
Access: The server runs at
http://localhost:9090.Stop:
docker-compose down.Environment: Ensure
NVD_API_KEYis in../.envor usedocker-compose --env-file ../.env up.
Running test_tools.py in the Docker Compose Scenario
To run the unit tests (test_tools.py) within the Docker environment:
Start the Service: Ensure the
mcp-nvdservice is running viadocker-compose up.Exec into the Container:
Identify the container name (e.g.,
mcp-nvd-mcp-nvd-1) with:docker psRun the tests inside the container:
docker exec -it mcp-nvd-mcp-nvd-1 python /app/tests/test_tools.pyNote: Assumes
test_tools.pyis copied into the image at/app/tests/. If not, modify the Dockerfile to include:COPY tests/ ./tests/Then rebuild the image with
docker build -t mcp-nvd:test .from the root.
Alternative: Run tests locally against the containerized service:
cd tests python test_tools.pyThis tests against
http://localhost:9090while the service runs.
Key Details
Port: 9090 is exposed for SSE access.
Logs: Stored in a
log-datavolume (optional).Image: Must be built once and tagged as
mcp-nvd:testbefore runningdocker-compose.
Credits to @sidharthrajaram for its working pattern for SSE-based MCP clients and servers: https://github.com/sidharthrajaram/mcp-sse
This server cannot be installed
remote-capable server
The server can be hosted and run remotely because it primarily relies on remote services or has no dependency on the local environment.
A Model Context Protocol server implementation to query the NIST National Vulnerability Database (NVD) via its API.
Related MCP Servers
- -security-license-qualityA Model Context Protocol server that enables AI assistants to search and retrieve information about security exploits and vulnerabilities from the Exploit Database, enhancing cybersecurity research capabilities.Last updated -11MIT License
- Asecurity-licenseAqualityA Model Context Protocol server designed for testing backend APIs for security vulnerabilities like authentication bypass, injection attacks, and data leakage.Last updated -1411MIT License
- Asecurity-licenseAqualityA Model Context Protocol server that enables AI-powered analysis of NPM packages through multiple tools for security vulnerability scanning, dependency analysis, package comparison, and quality assessment.Last updated -191838TypeScriptMIT License
- Asecurity-licenseAqualityA Model Context Protocol server that retrieves CVE information from the National Vulnerability Database, allowing AI models to access up-to-date vulnerability data.Last updated -17Apache 2.0