Fire in da houseTop Tip:Paying $100+ per month for Perplexity, MidJourney, Runway, ChatGPT is crazy - get all your AI tools in one site starting at $15 per month with Galaxy AIFire in da houseCheck it out free

mcp-security-audit

MCP.Pizza Chef: qianniuspace

mcp-security-audit is a robust MCP server designed to scan npm package dependencies for security vulnerabilities in real time. It integrates with remote npm registries to provide detailed vulnerability reports categorized by severity levels, supporting npm, pnpm, and yarn package managers. This server helps developers ensure their projects are secure by identifying critical, high, moderate, and low-risk issues promptly.

Use This MCP server To

Scan npm dependencies for security vulnerabilities automatically Generate detailed vulnerability reports with severity classification Integrate real-time security checks into CI/CD pipelines Monitor project dependencies for newly disclosed vulnerabilities Support security audits for npm, pnpm, and yarn package managers

README

Security Audit Tool

smithery badge NPM version License: MIT

A powerful MCP (Model Context Protocol) Server that audits npm package dependencies for security vulnerabilities. Built with remote npm registry integration for real-time security checks.

Features

  • πŸ” Real-time security vulnerability scanning
  • πŸš€ Remote npm registry integration
  • πŸ“Š Detailed vulnerability reports with severity levels
  • πŸ›‘οΈ Support for multiple severity levels (critical, high, moderate, low)
  • πŸ“¦ Compatible with npm/pnpm/yarn package managers
  • πŸ”„ Automatic fix recommendations
  • πŸ“‹ CVSS scoring and CVE references

Installing via Smithery

To install Security Audit Tool for Claude Desktop automatically via Smithery:

npx -y @smithery/cli install @qianniuspace/mcp-security-audit --client claude

MCP Integration

Option 1: Using NPX (Recommended)

  1. Add MCP configuration to Cline /Cursor:
{
  "mcpServers": {
    "mcp-security-audit": {
      "command": "npx",
      "args": ["-y", "mcp-security-audit"]
    }
  }
}

Option 2: Download Source Code and Configure Manually

  1. Clone the repository:
git clone https://github.com/qianniuspace/mcp-security-audit.git
cd mcp-security-audit
  1. Install dependencies and build:
npm install
npm run build
  1. Add MCP configuration to Cline /Cursor :
{
  "mcpServers": {
    "mcp-security-audit": {
      "command": "npx",
      "args": ["-y", "/path/to/mcp-security-audit/build/index.js"]
    }
  }
}

Configuration Screenshots

Cursor Configuration

Cursor Configuration

Cline Configuration

Cline Configuration

API Response Format

The tool provides detailed vulnerability information including severity levels, fix recommendations, CVSS scores, and CVE references.

Response Examples

1. When Vulnerabilities Found (Severity-response.json)

{
  "content": [{
    "vulnerability": {
      "packageName": "lodash",
      "version": "4.17.15",
      "severity": "high",
      "description": "Prototype Pollution in lodash",
      "cve": "CVE-2020-8203",
      "githubAdvisoryId": "GHSA-p6mc-m468-83gw",
      "recommendation": "Upgrade to version 4.17.19 or later",
      "fixAvailable": true,
      "fixedVersion": "4.17.19",
      "cvss": {
        "score": 7.4,
        "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
      },
      "cwe": ["CWE-1321"],
      "url": "https://github.com/advisories/GHSA-p6mc-m468-83gw"
    },
    "metadata": {
      "timestamp": "2024-04-23T10:00:00.000Z",
      "packageManager": "npm"
    }
  }]
}

2. When No Vulnerabilities Found (no-Severity-response.json)

{
  "content": [{
    "vulnerability": null,
    "metadata": {
      "timestamp": "2024-04-23T10:00:00.000Z",
      "packageManager": "npm",
      "message": "No known vulnerabilities found"
    }
  }]
}

Development

For development reference, check the example response files in the public directory:

  • Severity-response.json : Example response when vulnerabilities are found (transformed from npm audit API response)
  • no-Severity-response.json : Example response when no vulnerabilities are found (transformed from npm audit API response)

Note: The example responses shown above are transformed from the raw npm audit API responses to provide a more structured format. The original npm audit API responses contain additional metadata and may have a different structure.

Contributing

Contributions are welcome! Please read our Contributing Guide for details on our code of conduct and the process for submitting pull requests.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Author

ESX (qianniuspace@gmail.com)

Links

mcp-security-audit FAQ

How does mcp-security-audit integrate with npm registries?
It connects remotely to npm registries to fetch package data and perform real-time vulnerability scans.
Can mcp-security-audit classify vulnerabilities by severity?
Yes, it supports multiple severity levels including critical, high, moderate, and low.
Is mcp-security-audit compatible with package managers other than npm?
Yes, it supports pnpm and yarn in addition to npm.
How can I use mcp-security-audit in my CI/CD pipeline?
You can integrate it as a server that automatically scans dependencies during build or deployment stages.
Does mcp-security-audit provide detailed reports?
Yes, it generates comprehensive vulnerability reports with severity details for each issue found.
Is mcp-security-audit open source?
Yes, it is licensed under the MIT License and available on npm.
What kind of vulnerabilities can mcp-security-audit detect?
It detects known security vulnerabilities in npm package dependencies based on registry data.
How frequently does mcp-security-audit update its vulnerability database?
It performs real-time checks by querying the remote npm registry, ensuring up-to-date vulnerability information.