# mcp-security-audit **Repository Path**: hoppin/mcp-security-audit ## Basic Information - **Project Name**: mcp-security-audit - **Description**: No description available - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2025-12-15 - **Last Updated**: 2025-12-15 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Security Audit Tool [![smithery badge](https://smithery.ai/badge/@qianniuspace/mcp-security-audit)](https://smithery.ai/server/@qianniuspace/mcp-security-audit) [![NPM version](https://img.shields.io/npm/v/mcp-security-audit.svg)](https://www.npmjs.com/package/mcp-security-audit) [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT) A powerful MCP (Model Context Protocol) Server that audits npm package dependencies for security vulnerabilities. Built with remote npm registry integration for real-time security checks. ## Features - 🔍 Real-time security vulnerability scanning - 🚀 Remote npm registry integration - 📊 Detailed vulnerability reports with severity levels - 🛡️ Support for multiple severity levels (critical, high, moderate, low) - 📦 Compatible with npm/pnpm/yarn package managers - 🔄 Automatic fix recommendations - 📋 CVSS scoring and CVE references ### Installing via Smithery To install Security Audit Tool for Claude Desktop automatically via [Smithery](https://smithery.ai/server/@qianniuspace/mcp-security-audit): ```bash npx -y @smithery/cli install @qianniuspace/mcp-security-audit --client claude ``` ### MCP Integration #### Option 1: Using NPX (Recommended) 1. Add MCP configuration to Cline /Cursor: ```json { "mcpServers": { "mcp-security-audit": { "command": "npx", "args": ["-y", "mcp-security-audit"] } } } ``` #### Option 2: Download Source Code and Configure Manually 1. Clone the repository: ```bash git clone https://github.com/qianniuspace/mcp-security-audit.git cd mcp-security-audit ``` 2. Install dependencies and build: ```bash npm install npm run build ``` 3. Add MCP configuration to Cline /Cursor : ```json { "mcpServers": { "mcp-security-audit": { "command": "npx", "args": ["-y", "/path/to/mcp-security-audit/build/index.js"] } } } ``` ## Configuration Screenshots ### Cursor Configuration ![Cursor Configuration](images/cursor-config.png) ### Cline Configuration ![Cline Configuration](images/cline-config.png) ## API Response Format The tool provides detailed vulnerability information including severity levels, fix recommendations, CVSS scores, and CVE references. ### Response Examples #### 1. When Vulnerabilities Found (Severity-response.json) ```json { "content": [{ "vulnerability": { "packageName": "lodash", "version": "4.17.15", "severity": "high", "description": "Prototype Pollution in lodash", "cve": "CVE-2020-8203", "githubAdvisoryId": "GHSA-p6mc-m468-83gw", "recommendation": "Upgrade to version 4.17.19 or later", "fixAvailable": true, "fixedVersion": "4.17.19", "cvss": { "score": 7.4, "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, "cwe": ["CWE-1321"], "url": "https://github.com/advisories/GHSA-p6mc-m468-83gw" }, "metadata": { "timestamp": "2024-04-23T10:00:00.000Z", "packageManager": "npm" } }] } ``` #### 2. When No Vulnerabilities Found (no-Severity-response.json) ```json { "content": [{ "vulnerability": null, "metadata": { "timestamp": "2024-04-23T10:00:00.000Z", "packageManager": "npm", "message": "No known vulnerabilities found" } }] } ``` ## Development For development reference, check the example response files in the `public` directory: - [Severity-response.json](public/Severity-response.json) : Example response when vulnerabilities are found (transformed from npm audit API response) - [no-Severity-response.json](public/no-Severity-response.json) : Example response when no vulnerabilities are found (transformed from npm audit API response) Note: The example responses shown above are transformed from the raw npm audit API responses to provide a more structured format. The original npm audit API responses contain additional metadata and may have a different structure. ## Contributing Contributions are welcome! Please read our [Contributing Guide](CODE_OF_CONDUCT.md) for details on our code of conduct and the process for submitting pull requests. ## License This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details. ## Author ESX (qianniuspace@gmail.com) ## Links - [GitHub Repository](https://github.com/qianniuspace/mcp-security-audit) - [Issue Tracker](https://github.com/qianniuspace/mcp-security-audit/issues) - [Changelog](CHANGELOG.md) ```