Security Scanner MCP Server
Enables comprehensive vulnerability scanning using Nuclei scanner with support for single targets, network ranges, and cluster-wide security assessments with customizable severity levels and automated scheduling.
README
Security Scanner MCP Server
Comprehensive security scanning using Nuclei vulnerability scanner with cluster-wide capabilities.
Part of the Agentic System - a 24/7 autonomous AI framework with persistent memory.
Comprehensive security scanning integration using Nuclei vulnerability scanner with cluster-wide capabilities.
Features
- Single Target Scanning: Scan individual URLs or IPs with customizable severity and templates
- Network Scanning: Batch scan multiple targets or CIDR ranges
- Cluster Integration: Scan all nodes in the agentic cluster
- Template Management: List, filter, and update Nuclei templates
- Scan History: Retrieve and analyze previous scan results
- Scheduled Scans: Configure periodic security assessments
- Multiple Output Formats: JSON, JSONL, or Markdown reports
Installation
cd ${AGENTIC_SYSTEM_PATH:-/opt/agentic}/mcp-servers/security-scanner-mcp
source ${AGENTIC_SYSTEM_PATH:-/opt/agentic}/.venv/bin/activate
pip install -e .
MCP Configuration
Add to ~/.claude.json:
{
"mcpServers": {
"security-scanner": {
"command": "${AGENTIC_SYSTEM_PATH:-/opt/agentic}/.venv/bin/python",
"args": ["-m", "security_scanner.server"],
"env": {
"NUCLEI_BIN": "${HOME}/go/bin/nuclei",
"SCAN_RESULTS_DIR": "${AGENTIC_SYSTEM_PATH:-/opt/agentic}/security-scans"
}
}
}
}
Available Tools
scan_target
Scan a single target with Nuclei vulnerability scanner.
Parameters:
target(required): URL or IP addressseverity: Array of severity levels ["info", "low", "medium", "high", "critical"]templates: Specific template paths or tagsrate_limit: Requests per second (default: 150)timeout: Scan timeout in seconds (default: 300)output_format: "json", "jsonl", or "markdown"
Example:
{
"target": "https://example.com",
"severity": ["high", "critical"],
"rate_limit": 100
}
scan_network
Scan multiple targets from a list or CIDR range.
Parameters:
targets: Array of target URLs/IPstarget_file: Path to file with targets (one per line)severity: Severity filterparallel: Number of concurrent scans (default: 5)rate_limit: Requests per second per target
scan_cluster_nodes
Scan all nodes in the agentic cluster for vulnerabilities.
Parameters:
scan_type: "network", "web", "api", or "full"severity: Severity levels to check
list_templates
List available Nuclei templates by tag, severity, or author.
Parameters:
tag: Filter by tag (e.g., "cve", "exposure")severity: Filter by severity levelauthor: Filter by template author
update_templates
Update Nuclei templates to the latest version.
get_scan_results
Retrieve results from a previous scan by scan_id.
Parameters:
scan_id(required): Scan identifierlimit: Max results to return (default: 100)severity: Filter by severity levels
list_scans
List all previous security scans.
Parameters:
limit: Maximum number of scans to returntarget: Filter by target
schedule_periodic_scan
Schedule recurring security scans (requires agent runtime).
Parameters:
targets(required): List of targets to scaninterval_hours: Scan interval (default: 24)severity_threshold: Minimum severity to report (default: "medium")notify_on_new: Alert on new vulnerabilities (default: true)
Integration with Agentic System
Cluster-Wide Scanning
The security scanner automatically detects and scans all nodes in the agentic cluster. Cluster nodes are loaded from configuration:
- builder - Linux build node
- orchestrator - Coordination node
- coordinator - Multi-node coordinator
- files - File server
Autonomous Agent Integration
Combine with the autonomous security scanning agent for:
- Automated vulnerability assessment
- Continuous security monitoring
- Intelligent threat prioritization
- Automatic remediation recommendations
Enhanced Memory Integration
Scan results are stored in enhanced-memory for:
- Historical vulnerability tracking
- Pattern recognition across scans
- Causal relationship analysis
- Learning from remediation outcomes
Scan Results
Results are stored in ${AGENTIC_SYSTEM_PATH:-/opt/agentic}/security-scans/:
scan_YYYYMMDD_HHMMSS_ID.json- Scan findingsscan_YYYYMMDD_HHMMSS_ID_metadata.json- Scan metadata
Example Usage
Scan a single target
# Via Claude Code
scan_target({
"target": "192.0.2.196",
"severity": ["high", "critical"],
"templates": ["network", "exposure"]
})
Scan entire cluster
scan_cluster_nodes({
"scan_type": "full",
"severity": ["medium", "high", "critical"]
})
Review previous scans
list_scans({"limit": 10})
get_scan_results({"scan_id": "scan_20251118_110000_1234"})
Security Considerations
- Scans generate network traffic - coordinate with network admin
- Rate limiting prevents overwhelming targets
- Results may contain sensitive information - restrict access
- Authorized scanning only - verify permission before scanning external targets
Dependencies
- Nuclei v3.5.1+
- Python 3.10+
- asyncio
- aiofiles
- pydantic
References
- Nuclei - Main vulnerability scanner
- nuclei-mcp - Reference MCP implementation
- ExternalAttacker-MCP - Security testing MCP
License
MIT License - Part of the Mac Pro 5,1 Agentic System
Part of the MCP Ecosystem
This server integrates with other MCP servers for comprehensive AGI capabilities:
| Server | Purpose |
|---|---|
| enhanced-memory-mcp | 4-tier persistent memory with semantic search |
| agent-runtime-mcp | Persistent task queues and goal decomposition |
| agi-mcp | Full AGI orchestration with 21 tools |
| cluster-execution-mcp | Distributed task routing across nodes |
| node-chat-mcp | Inter-node AI communication |
| ember-mcp | Production-only policy enforcement |
See agentic-system-oss for the complete framework.
推荐服务器
Baidu Map
百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Playwright MCP Server
一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。
Magic Component Platform (MCP)
一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。
Audiense Insights MCP Server
通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。
VeyraX
一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。
graphlit-mcp-server
模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。
Kagi MCP Server
一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。
e2b-mcp-server
使用 MCP 通过 e2b 运行代码。
Neon MCP Server
用于与 Neon 管理 API 和数据库交互的 MCP 服务器
Exa MCP Server
模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。