Fire in da houseTop Tip:Paying $100+ per month for Perplexity, MidJourney, Runway, ChatGPT and other tools is crazy - get all your AI tools in one site starting at $15 per month with Galaxy AI Fire in da houseCheck it out free

cursor-mcp-trivy

MCP.Pizza Chef: norbinsh

cursor-mcp-trivy is an MCP server that integrates Trivy security scanning into development workflows via a standardized protocol. It enables automatic scanning of project directories for vulnerabilities, supports multiple package managers, and can apply automated fixes to update vulnerable dependencies. Designed as a proof of concept, it demonstrates seamless interaction between Cursor IDE, MCP, and Trivy for enhanced security analysis.

Use This MCP server To

Scan project directories for security vulnerabilities automatically Identify vulnerable dependencies across multiple package managers Apply automated fixes to update insecure dependencies Integrate security scanning into IDE workflows via MCP Experiment with MCP and Trivy integration for security analysis

README

Trivy Security Scanner MCP Server

A Model Context Protocol (MCP) server that provides Trivy security scanning capabilities through a standardized interface.

⚠️ Note: This is a proof of concept project to demonstrate the integration capabilities between MCP, Cursor IDE, and Trivy. It's intended for experimentation and learning purposes only and is not production-ready. Use at your own risk.

Features

  • 🔍 Project Scanning: Automatically scan your project directory for security vulnerabilities using Trivy
  • 🛠️ Automated Fixes: Automatically update vulnerable dependencies to secure versions
  • 📦 Multi-Package Support: Handles multiple package managers (Python, Node.js, Ruby, Go)

Demo

Demo

Architecture

┌─────────────┐     ┌──────────────┐     ┌─────────────┐
│  Cursor IDE │ --> │   MCP Server │ --> │    Trivy    │
│  (Composer) │     │              │     │             │
└─────────────┘     └──────────────┘     └─────────────┘

Prerequisites

  • Python 3.12 or higher
  • Trivy installed on your system:
    # macOS
    brew install trivy

Installation

# Create and activate virtual environment
python -m venv .venv
source .venv/bin/activate

# Install dependencies
pip install -r requirements.txt

Usage

Start the server using SSE transport:

# Using SSE transport (default)
python server.py --transport sse --port 54321

The server exposes two tools:

  1. scan_project: Scans a directory for security vulnerabilities

    • Required argument: workspace - The directory path to scan
  2. fix_vulnerability: Updates a vulnerable package to a secure version

    • Required arguments:
      • workspace - The directory to modify
      • pkg_name - Name of the package to update
      • target_version - Version to update to

Using with Cursor IDE

  1. Start the server with SSE transport:

    python server.py --transport sse --port 54321
  2. Configure in Cursor:

    • Open Settings
    • Go to Features > MCP Servers
    • Add: http://127.0.0.1:54321/sse
  3. Add the following to your .cursorrules file, create it if you don't have one yet:

    After making changes in any of the package dependency/manifest files, scan the project for security vulnerabilities.
    Fixes should only be according to the desired version reported by the scanner.
    If the scanner reports a fix unrelated to our change, ignore it.
    After performing the fix, scan the project for security vulnerabilities again.
    

    This configuration will:

    • Automatically trigger a security scan when any dependency file is modified
    • Help identify vulnerabilities as soon as new dependencies are added
    • Ensure your project stays secure throughout development

    if you want to use the tool manually, you can use prompt the agent to use the tool with the following prompt through the composer interface:

    Please scan my project for security vulnerabilities
    

Why MCP?

MCP (Model Context Protocol) exists to solve a fundamental problem in working with large language models (LLMs): how to efficiently and consistently connect these models to external data sources and tools.

Learn more at modelcontextprotocol.io.

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

License

MIT License

Acknowledgments

cursor-mcp-trivy FAQ

How does cursor-mcp-trivy integrate with development environments?
It connects MCP-enabled IDEs like Cursor IDE to Trivy via a standardized MCP server interface, enabling seamless security scanning within the IDE.
Which package managers does cursor-mcp-trivy support?
It supports multiple package managers including Python, Node.js, Ruby, and Go.
Is cursor-mcp-trivy production-ready?
No, it is a proof of concept intended for experimentation and learning, not for production use.
Can cursor-mcp-trivy automatically fix vulnerabilities?
Yes, it can automatically update vulnerable dependencies to secure versions.
What is required to use cursor-mcp-trivy?
You need an MCP-compatible IDE or client and a project directory to scan with Trivy installed or accessible.
Does cursor-mcp-trivy support real-time scanning?
It is designed to scan project directories on demand through MCP interactions, enabling near real-time feedback.
How secure is the data handled by cursor-mcp-trivy?
As a proof of concept, security depends on the underlying MCP and Trivy implementations; users should evaluate risks before use.