MCP server for the Vulners.com API
Valid MCP server (1 strong, 3 medium validity signals). No known CVEs in dependencies. Imported from the Official MCP Registry. 1 finding(s) downgraded by scanner intelligence.
3 files analyzed ยท 1 issue found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-vulnerscom-vulners-mcp": {
"args": [
"vulners-mcp"
],
"command": "uvx"
}
}
}From the project's GitHub README.
Vulners MCP is a Model Context Protocol (MCP) server that provides seamless access to the Vulners vulnerability database through AI assistants like Claude Desktop. It enables security researchers and developers to query comprehensive vulnerability data, search for CVEs, analyze security bulletins, and audit software packages directly through natural language conversations.
Please, register at Vulners website. Go to the personal menu by clicking at your name at the right top corner. Follow "API KEYS" tab. Generate API key with scope "api" and use it with the library.
The easiest way to use Vulners MCP is through Claude Desktop:
git clone https://github.com/vulnersCom/vulners-mcp.git
cd vulners-mcp
docker build -t vulners-mcp:latest .
Add to your Claude Desktop configuration file:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Linux: ~/.config/Claude/claude_desktop_config.json
{
"mcpServers": {
"vulners": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"-e",
"VULNERS_API_KEY=YOUR_API_KEY_HERE",
"vulners-mcp:latest"
]
}
}
}
Replace YOUR_API_KEY_HERE with your actual Vulners API key.
After saving the configuration, restart Claude Desktop. The Vulners MCP server will be available through the ๐ icon.
You can now ask Claude questions like:
For easy HTTP mode deployment, use the provided run script:
# Create .env file with your API key
echo "VULNERS_API_KEY=your_api_key_here" > .env
# Run the server
./run-docker.sh
The server will start in HTTP mode at http://0.0.0.0:8000/mcp
Run the MCP server in HTTP mode:
docker run -d \
--name vulners-mcp-http \
-e MCP_TRANSPORT_MODE="http" \
-e VULNERS_BASE_URL="https://vulners.com" \
-e VULNERS_API_KEY="your_api_key" \
-p 8000:8000 \
vulners-mcp:latest
For Claude Desktop (stdio mode), the -i flag is used instead:
docker run -i --rm \
-e VULNERS_API_KEY="your_api_key" \
vulners-mcp:latest
git clone https://github.com/vulnersCom/vulners-mcp.git
cd vulners-mcp
poetry install
export VULNERS_API_KEY="your_api_key"
poetry run python -m vulners_mcp
| Variable | Type | Default | Description |
|---|---|---|---|
VULNERS_API_KEY | string | required | API key for authenticating with Vulners |
VULNERS_BASE_URL | string | https://vulners.com | Base URL for the Vulners API (without /api suffix) |
MCP_TRANSPORT_MODE | string | stdio | Force transport mode: http or streamable-http |
FASTMCP_HOST | string | 0.0.0.0 | Host/interface on which MCP server binds (HTTP mode only) |
FASTMCP_PORT | integer | 8000 | Port for MCP server (HTTP mode only) |
FASTMCP_STREAMABLE_HTTP_PATH | string | /mcp | Path for the streamable MCP endpoint (HTTP mode only) |
Transport Mode:
MCP_TRANSPORT_MODE=http to explicitly force HTTP mode (for standalone HTTP server)docker run -iSimply ask questions in natural language:
When running in HTTP mode, clients connect to:
http://<FASTMCP_HOST>:<FASTMCP_PORT>/mcp
Default: http://0.0.0.0:8000/mcp
Test the HTTP server using the provided test script:
# Ensure the HTTP server is running
docker ps | grep vulners-mcp
# Run the test script
python3 test_tools.py
The test script will:
The server provides 7 MCP tools for vulnerability research:
search_lucene - ๐ DISCOVERY TOOL FOR UNKNOWN VULNERABILITIES ๐ Full-text search in Vulners Knowledge Base using Lucene syntax. Use ONLY when you don't have specific IDs or version information. NEVER use for known CVE/bulletin IDs - use bulletin_by_id instead. NEVER use for specific software versions (e.g., 'Chrome 138.0.7204.184') - use audit_software instead. ๐จ CRITICAL: For vendor/product searches, ALWAYS use cnaAffected.vendor and cnaAffected.product fields - the affectedSoftware field does NOT exist.
bulletin_by_id - ๐จ PRIMARY TOOL FOR KNOWN IDs ๐จ Fetch full bulletin by CVE or Vulners ID. Use this when you have a specific identifier like CVE-2024-1234, RHSA-2024:001, CTX694938, etc. Supports single ID or list of IDs. When list is provided, references are automatically set to False. NEVER use search_lucene for known IDs.
query_autocomplete - Autocomplete helper for search inputs (vendors, products, CVEs, etc.). Get search suggestions from the Vulners database.
search_cpe - Find CPE strings by vendor+product (latest schema). Search for Common Platform Enumeration identifiers in the Vulners database.
audit_software - ๐ VERSION-SPECIFIC SOFTWARE AUDIT ๐ Audit specific software versions for known vulnerabilities. Use this when you have exact software version information (e.g., Chrome 138.0.7204.184). NEVER use search_lucene for version-specific software audits.
audit_linux_packages - Linux package audit (RPM/DEB) for a given distro + version. Analyze Linux package vulnerabilities against the Vulners database.
bulletin_by_id: Use when you have SPECIFIC IDs
search_lucene: Use ONLY for DISCOVERY when you don't have specific IDs
audit_software: Use for VERSION-SPECIFIC software audits
EFFICIENCY RULE: One bulletin_by_id call is sufficient for known IDs. Do NOT follow up with search_lucene unless explicitly asked to broaden scope.
bulletin_by_id with the list of CVE IDs for detailed analysisbulletin_by_id is more efficient than multiple individual callsFor detailed tool documentation and parameters, use Claude's tool inspection or check the server's tool list.
git clone https://github.com/vulnersCom/vulners-mcp.git
cd vulners-mcp
docker build -t vulners-mcp:latest .
MIT
MCP Name: io.github.vulnersCom/vulners-mcp
Be the first to review this server!
by Modelcontextprotocol ยท Developer Tools
Web content fetching and conversion for efficient LLM usage
by Modelcontextprotocol ยท Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno ยท Developer Tools
Toleno Network MCP Server โ Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace ยท Developer Tools
Create, build, and publish Python MCP servers to PyPI โ conversationally.