Skip to main content
Glama
127,274 tools. Last updated 2026-05-05 13:07

"MCP server for analyzing CVEs (Common Vulnerabilities and Exposures)" matching MCP tools:

  • Scan an MCP server for security vulnerabilities, description quality, and architecture issues. Get a security rating from F to A+ with actionable recommendations for safe deployment.
    MIT
  • Batch-scan MCP server names from fleet inventory data to assess security risk, returning per-server risk category, CVEs, and registry match verdict.
  • Scan project dependencies for known vulnerabilities using npm audit and the GitHub Advisory Database. Returns CVEs, severity levels, and patched versions to identify security risks.
  • Scans npm dependencies for known vulnerabilities using the GitHub Advisory Database. Identifies CVEs, severity levels, and patched versions to help secure your project.
  • Test a specific MCP server before installing or after updating by launching it with a command, checking all capabilities, and saving a run artifact. Optionally invoke tools to verify execution and analyze schemas for vulnerabilities.
    MIT

Matching MCP Servers

Matching MCP Connectors

  • Scan MCP servers for security vulnerabilities including prompt injection, tool poisoning, and credential exposure. Returns findings with severity levels.
    MIT
  • Audit any MCP server from the registry or GitHub. Analyzes tool permissions, data flow risks, and vulnerabilities to verify safety before installation.
    Apache 2.0
  • Run an AI supply chain security scan that discovers MCP configurations, extracts package dependencies, identifies CVEs, assesses credential exposure, and computes blast radius for comprehensive risk analysis.
  • Get started with Signal Found MCP by following the recommended call sequence, common guardrails, and recovery hints for onboarding agents.
    MIT
  • Scan project dependencies for security vulnerabilities by analyzing requirements.txt, pyproject.toml, and other dependency files to identify known CVEs in installed packages.
    MIT
  • Search Common Vulnerabilities and Exposures (CVEs) by keyword in their descriptions to identify relevant security vulnerabilities.
    MIT
  • Search for Common Vulnerabilities and Exposures (CVEs) by vendor and product to identify security risks in software components.
    MIT
  • Search for Common Vulnerabilities and Exposures (CVEs) by keyword in the NIST National Vulnerability Database to identify security vulnerabilities.
    MIT
  • Predict which CVEs will likely be added to CISA's Known Exploited Vulnerabilities catalog soon. Prioritize patching for unpatched vulnerabilities based on EPSS scores, exploit availability, ransomware association, and active exploitation data.