UNPKG

mcp-cve-intelligence-server-lite

Version:

Lite Model Context Protocol server for comprehensive CVE intelligence gathering with multi-source exploit discovery, designed for security professionals and cybersecurity researchers

206 lines (198 loc) 5.01 kB
{ "sources": { "nvd": { "name": "National Vulnerability Database", "baseUrl": "https://services.nvd.nist.gov/rest/json/cves/2.0", "apiKeyRequired": false, "apiKeyEnvVar": "NVD_API_KEY", "authHeaderType": "apiKey", "authHeaderName": "apiKey", "requestTimeout": 3000, "priority": 1, "enabled": true, "endpoints": { "search": "/", "details": "/" }, "features": [ "search", "details", "cvss", "references", "cpe" ] }, "github": { "name": "GitHub Security Advisories", "baseUrl": "https://api.github.com/advisories", "apiKeyRequired": false, "apiKeyEnvVar": "GITHUB_TOKEN", "authHeaderType": "token", "authHeaderName": "Authorization", "requestTimeout": 3000, "priority": 2, "enabled": true, "endpoints": { "search": "/", "details": "/" }, "features": [ "search", "details", "exploits", "patches" ] }, "mitre": { "name": "MITRE CVE Records", "baseUrl": "https://cveawg.mitre.org/api", "apiKeyRequired": false, "apiKeyEnvVar": "MITRE_API_KEY", "requestTimeout": 3000, "priority": 3, "enabled": true, "endpoints": { "search": "/cve", "details": "/cve" }, "features": [ "details", "official", "authoritative", "cvss", "references" ] } }, "scoring": { "tiers": [ { "name": "critical", "conditions": [ {"cvssScore": 9.0, "operator": ">=", "hasExploit": true}, {"cvssScore": 9.8, "operator": ">=", "ageInDays": 30, "ageOperator": "<"} ], "score": 1.0 }, { "name": "high", "conditions": [ {"cvssScore": 7.0, "operator": ">=", "hasExploit": true}, {"cvssScore": 9.0, "operator": ">=", "ageInDays": 60, "ageOperator": "<"} ], "score": 0.8 }, { "name": "medium", "conditions": [ {"cvssScore": 4.0, "operator": ">=", "hasExploit": true}, {"cvssScore": 7.0, "operator": ">=", "ageInDays": 90, "ageOperator": "<"} ], "score": 0.6 } ], "fallback": { "exploitAvailabilityWeight": 0.4, "cvssWeight": 0.35, "ageWeight": 0.25 } }, "epss": { "baseFactors": { "cvssWeight": 0.3, "exploitAvailabilityWeight": 0.25, "ageWeight": 0.15 }, "exploitabilityFactors": { "attackVectorWeight": 0.1, "attackComplexityWeight": 0.08, "privilegesRequiredWeight": 0.07, "userInteractionWeight": 0.05 }, "contextualFactors": { "exploitMaturityWeight": 0.1, "publicDisclosureWeight": 0.05 }, "factors": { "attackVector": { "NETWORK": 1.0, "ADJACENT": 0.7, "LOCAL": 0.4, "PHYSICAL": 0.1 }, "attackComplexity": { "LOW": 1.0, "HIGH": 0.3 }, "privilegesRequired": { "NONE": 1.0, "LOW": 0.6, "HIGH": 0.3 }, "userInteraction": { "NONE": 1.0, "REQUIRED": 0.5 }, "exploitMaturity": { "UNPROVEN": 0.1, "PROOF_OF_CONCEPT": 0.4, "FUNCTIONAL": 0.7, "HIGH": 1.0 } } }, "exploitIndicators": { "patterns": { "exploitdb": { "domains": ["exploit-db.com"], "paths": [], "keywords": ["exploit-db"], "description": "Exploit Database references" }, "metasploit": { "domains": ["rapid7.com"], "paths": ["/db"], "keywords": ["metasploit"], "description": "Metasploit Framework references" }, "packetstorm": { "domains": ["packetstormsecurity.com"], "paths": [], "keywords": ["packetstorm"], "description": "Packet Storm Security references" }, "github": { "domains": ["github.com"], "paths": [], "keywords": ["exploit", "poc", "proof-of-concept"], "description": "GitHub exploit/PoC repositories" }, "nuclei": { "domains": [], "paths": [], "keywords": ["nuclei-templates", "nuclei"], "description": "Nuclei vulnerability templates" }, "nmap": { "domains": [], "paths": [], "keywords": ["nmap", "script"], "description": "Nmap security scripts" } }, "customPatterns": [ "(?:0day|zero-day).*(?:exploit|poc)", "vulnerability.*scanner.*(?:nuclei|nmap)", "(?:weaponized|weaponization).*exploit", "(?:rce|remote.code.execution).*(?:poc|exploit)" ], "enabled": true }, "defaults": { "requestTimeout": 3000, "retryAttempts": 3, "retryDelayMs": 1000, "retryBackoffMultiplier": 2, "retryOnStatusCodes": [429, 502, 503, 504] } }