127,124 tools. Last updated 2026-05-05 08:27
"Security testing and vulnerability assessment of MCP Server execution functions" matching MCP tools:
- Get detailed vulnerability information by CVE identifier, including severity scores, technical details, and exploitation status for threat assessment and patching prioritization.Apache 2.0
- Check security vulnerabilities and CVEs for packages to support security audits and vulnerability assessments.
- Query ZoomEye's vulnerability database by keyword to retrieve detailed security vulnerabilities including CVE IDs, severity, and affected versions for specific products or vendors.MIT
- Assess organizational security posture by retrieving security scores, vulnerability trends, and risk assessments to identify and address security gaps.MIT
- Approve security patches for vulnerability issues in the ZeroPath MCP Server to manage software security findings.MIT
- Confirm a security vulnerability by marking it as a true positive using the issue ID. This action validates identified security findings for accurate tracking and resolution.MIT
Matching MCP Servers
- Flicense-qualityCmaintenanceProvides penetration testing tools including nmap, nikto, sqlmap, wpscan, and exploit database searches for educational and authorized security testing purposes using Kali Linux tools.Last updated
- AlicenseAqualityCmaintenanceAn MCP server that exposes a legacy vulnerability database as tools for LLM clients, enabling security analysts to query vulnerabilities using natural language through six specialized tools for vendor lookup, vulnerability search, and risk analysis.Last updated6MIT
Matching MCP Connectors
AI agents publish bounties for real-world tasks. Gasless USDC payments via x402.
Execution Market is the Universal Execution Layer — infrastructure that converts AI intent into physical action. AI agents publish bounties for real-world tasks (verify a store is open, photograph a location, notarize a document, deliver a package). Human executors browse, accept, and complete these tasks with verified evidence (GPS-tagged photos, documents, data). Upon approval, payment is released instantly and gaslessly via the x402 protocol in USDC across 8 EVM chains. Key cap
- Search for detailed vulnerability information by CVE, CNVD, or CNNVD ID and receive comprehensive, formatted security vulnerability details.MIT
- Mark plugins as reviewed and set permissions after security assessment in OpenTabs MCP server. Use review tokens from inspection to control plugin access.
- Query OSCAL assessment plans that define security control assessment methods. Supports filtering by UUID, title, or type.Apache 2.0
- Discover available FedRAMP FRMR documents including security indicators, assessment standards, vulnerability data, change notifications, definitions, and authorization data to begin compliance analysis.MIT
- Retrieve server version and capabilities to verify the SRC MCP server is running correctly and understand its available functions.MIT
- Scan npm MCP server packages for security risks like backdoors, dangerous code, and supply chain vulnerabilities. Download and analyze packages to generate detailed security reports with severity ratings before installation.MIT
- Retrieve execution status, input, and output data for AWS Step Functions workflows to monitor and troubleshoot state machine processes.BSD 3-Clause
- Verify the safety of AI agent skills or tools before execution. Classifies each as SAFE, CAUTION, or DANGER based on analysis of permissions, commands, and description. Use to audit MCP tools, OpenAI functions, or any agent capability.MIT
- Run security testing commands like nmap, sqlmap, and hydra inside a Kali Linux container for penetration testing and vulnerability assessment.MIT
- Audit MCP server configurations to identify security vulnerabilities including hardcoded secrets, exposed tokens, and shell injection patterns.
- Retrieve detailed vulnerability information by CVE ID, including vendor data, for security analysis and risk assessment.MIT
- Analyze JavaScript files to extract endpoints and secrets for security testing and vulnerability assessment.MIT
- Analyze HTTP response headers to identify security configurations, caching directives, CORS settings, and server details while providing a security assessment grade.MIT
- Validate code for security vulnerabilities including XSS, SQL injection risks, and insecure functions to identify potential security issues.