Fire in da houseTop Tip:Paying $100+ per month for Perplexity, MidJourney, Runway, ChatGPT and other tools is crazy - get all your AI tools in one site starting at $15 per month with Galaxy AI Fire in da houseCheck it out free

EPSS-MCP

MCP.Pizza Chef: jgamblin

EPSS-MCP is a robust MCP server that aggregates detailed CVE vulnerability information from the NVD API and combines it with EPSS scores to assess exploitation likelihood. It provides comprehensive data including CVE descriptions, CWEs, CVSS scores, and EPSS percentiles. Designed for easy integration, it supports Docker deployment and VS Code compatibility, enabling real-time vulnerability insights within developer workflows.

Use This MCP server To

Retrieve detailed CVE vulnerability data from the NVD API Fetch EPSS scores to evaluate exploitation risk of vulnerabilities Integrate vulnerability data into developer tools like VS Code Deploy vulnerability data server easily using Docker containers Provide real-time CVE and EPSS information for security analysis Aggregate CVE descriptions, CWEs, and CVSS scores in one API Enable automated security workflows with structured vulnerability data

README

EPSS MCP Project

The EPSS MCP Project is a powerful server designed to retrieve CVE details from the NVD API and fetch EPSS scores from the EPSS server. It provides users with comprehensive vulnerability information, including CVE descriptions, CWEs, CVSS scores, and EPSS percentiles, all in one place.

Features

  • Comprehensive CVE Information: Fetch detailed vulnerability data, including descriptions, CWEs, and CVSS scores, directly from the NVD API.
  • EPSS Integration: Retrieve EPSS scores and percentiles to assess the likelihood of exploitation for specific vulnerabilities.
  • MCP Server: Serve data through a robust and extensible MCP server for seamless integration with other tools.
  • Docker Support: Easily deploy the server using Docker for a consistent and portable runtime environment.
  • VS Code Compatibility: Integrate with VS Code MCP for enhanced developer workflows and real-time vulnerability insights.

Prerequisites

  • Python 3.13 or higher
  • Docker (optional, for containerized deployment)
  • An NVD API key (add it to the .env file as NVD_API_KEY)

Setup Instructions

1. Clone the Repository

git clone <repository-url>
cd epss-mcp-project

2. Install Dependencies

It is recommended to use a virtual environment. You can create one using venv or conda. Then, install the required packages:

pip install -r requirements.txt

3. Add Your NVD API Key

Create a .env file in the project root and add your NVD API key:

NVD_API_KEY=your-nvd-api-key

Usage

Installing via Smithery

To install EPSS Vulnerability Scoring Server for Claude Desktop automatically via Smithery:

npx -y @smithery/cli install @jgamblin/EPSS-MCP --client claude

Running the MCP Server Locally

To start the MCP server locally, run:

python epss_mcp.py

Once the server is running, you can make requests to retrieve CVE details by specifying the CVE ID.

Example Request

To get details for a specific CVE, use the following format:

GET /cve/<CVE-ID>

Replace <CVE-ID> with the actual CVE identifier (e.g., CVE-2022-1234).

Docker Deployment (for Open-WebUI)

If you want to run the MCP server in Open-WebUI, follow these steps:

1. Build the Docker Image

To build the Docker container, run:

docker build -t epss_mcp .

2. Run the Docker Container

Run the container and expose it on port 8000:

docker run -p 8000:8000 epss_mcp

The MCP server will now be accessible at http://localhost:8000.

WebUI Screenshot

Below is a screenshot of the MCP server running in the Open-WebUI:

EPSS MCP WebUI Screenshot

Suggested System Prompt for WebUI

When using the MCP server in Open-WebUI, you can configure the following system prompt to guide interactions:

You are a specialized AI Assistant focused on the Exploit Prediction Scoring System (EPSS). Your expertise lies in delivering and interpreting EPSS data, which includes daily updated probability scores (0-1) and percentiles for Common Vulnerabilities and Exposures (CVEs), indicating the likelihood of their exploitation in the wild within the next 30 days. You are to help cybersecurity professionals understand these predictions, compare them with other metrics like CVSS scores, and use this information to prioritize vulnerability remediation efforts effectively. Provide actionable, data-driven insights in a clear, technically accurate, professional, and solution-oriented manner.

Serving to VS Code MCP

To serve the MCP server to VS Code MCP, follow these steps:

  1. Add the Local Server to VS Code: Open your VS Code settings.json file and add the following configuration to register the local server:

    "mcp.servers": {
        "EPSS_MCP": {
            "type": "stdio",
            "command": "python",
            "args": [
                "/Github/EPSS-MCP/epss_mcp.py"
            ]
        }
    }

    Note: Make sure to update the args path to match the location of the epss_mcp.py file on your local machine.

  2. Connect to VS Code:

    • Open VS Code.
    • Install the Microsoft Copilot Labs extension if not already installed.
    • Ensure the MCP server is listed and active in the extension.
  3. Start Using the MCP Server: Once connected, VS Code will call the Python file directly to fetch CVE details and EPSS scores.

VS Code Screenshot

Below is a screenshot of the MCP server integrated with VS Code:

EPSS MCP VS Code Screenshot

Project Structure

epss-mcp-project
├── epss_mcp.py               # Main entry point for the MCP server
├── nvd_api.py                # Functions to interact with the NVD API
├── epss_api.py               # Functions to interact with the EPSS API
├── epss_mcp_test.py          # Test script for the MCP server
├── requirements.txt          # Project dependencies
├── Dockerfile                # Docker configuration
├── .env                      # Environment variables (e.g., API keys)
└── README.md                 # Project documentation

Contributing

Contributions are welcome! Please feel free to submit a pull request or open an issue for any enhancements or bug fixes.

License

This project is licensed under the MIT License. See the LICENSE file for more details.

smithery badge

EPSS-MCP FAQ

How do I deploy the EPSS-MCP server?
You can deploy EPSS-MCP easily using Docker for a consistent and portable environment.
What data sources does EPSS-MCP use?
EPSS-MCP fetches CVE details from the NVD API and EPSS scores from the EPSS server.
Can EPSS-MCP integrate with development environments?
Yes, it supports integration with VS Code MCP for real-time vulnerability insights.
What programming language is EPSS-MCP built with?
EPSS-MCP requires Python 3.13 or higher for deployment and operation.
Does EPSS-MCP provide exploitation likelihood metrics?
Yes, it provides EPSS percentiles indicating the likelihood of vulnerability exploitation.
Is EPSS-MCP extensible for other vulnerability data sources?
Yes, it is designed as a robust MCP server allowing extensibility for additional data sources.
How does EPSS-MCP improve security workflows?
By aggregating CVE and EPSS data, it enables automated and informed vulnerability management.
Which LLM providers can work with EPSS-MCP?
EPSS-MCP can be integrated with LLMs like OpenAI, Anthropic Claude, and Google Gemini for enhanced security insights.