Introducing Socket Firewall: Free, Proactive Protection for Your Software Supply Chain.Learn More
Socket
Book a DemoInstallSign in
Socket

@scarlet-mesh/mcp-cve

Package Overview
Dependencies
Maintainers
2
Versions
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@scarlet-mesh/mcp-cve

CVE MCP Server providing security vulnerability analysis and Red Hat CVE data

latest
npmnpm
Version
1.0.0
Version published
Maintainers
2
Created
Source

Red Hat CVE Information MCP Server

Overview

This MCP (Model Context Protocol) server, cve, provides comprehensive access to Red Hat's Common Vulnerabilities and Exposures (CVE) information through Red Hat's CSAF (Common Security Advisory Framework) feed. It enables AI tools and applications to retrieve detailed security vulnerability information, including severity ratings, affected products, remediation steps, and reference links.

Features

  • CVE Data Retrieval: Fetch detailed information for any CVE from Red Hat's security feed
  • Severity Assessment: Get CVSS v3 severity ratings (Critical, Important, Moderate, Low)
  • Affected Products: Identify which Red Hat products and versions are impacted by specific vulnerabilities
  • Remediation Information: Access detailed remediation steps and security patches
  • Rich HTML Summaries: Generate formatted HTML cards with comprehensive CVE information
  • Reference Links: Direct access to security advisories and additional documentation

Tools

The server provides the following MCP tools:

  • summarize-cve: Fetch and summarize a CVE from Red Hat's CSAF feed with detailed markdown formatting
  • get-cve-summary-html: Generate a rich HTML card-style summary with severity, products, links, and remediation info

Data Source

The server fetches CVE data from Red Hat's CSAF v2 VEX feed:

https://security.access.redhat.com/data/csaf/v2/vex/{year}/cve-{year}-{number}.json

This provides the most up-to-date and comprehensive security information directly from Red Hat's security team.

Setup

Prerequisites

  • Node.js
  • Internet connection (for accessing Red Hat's CSAF feed)
  • An MCP client (e.g., a compatible AI tool or application)

Installation

  • Clone this repository or navigate to the cve package.

  • Install the dependencies:

    npm install
    

Running the Server

  • Start the server:

    npm start
    

    The server will listen for MCP requests via standard input/output.

Usage

To use the server, send MCP requests from a compatible client. Here are example requests for each tool:

  • Get CVE summary (Markdown format):

    {
      "tool_name": "summarize-cve",
      "input": {
        "cveId": "CVE-2024-53907"
      }
    }
    
  • Get CVE summary (HTML format):

    {
      "tool_name": "get-cve-summary-html",
      "input": {
        "cveId": "CVE-2024-53907"
      }
    }
    

CVE ID Format

The server accepts CVE IDs in the standard format: CVE-YYYY-NNNNN

Examples:

  • CVE-2024-53907
  • CVE-2023-12345
  • CVE-2022-67890

Refer to the MCP client documentation for instructions on sending requests and handling responses.

Response Formats

Markdown Summary

The summarize-cve tool provides comprehensive information in markdown format including:

  • Title: Full CVE title and description
  • Tracking ID: Internal Red Hat tracking identifier
  • Severity: CVSS v3 severity rating
  • Notes: Detailed vulnerability description and context
  • Affected Products: List of impacted Red Hat products and versions
  • References: Links to security advisories and additional resources

HTML Summary

The get-cve-summary-html tool generates a rich, styled HTML card featuring:

  • Color-coded severity indicators:
    • Critical: Red background
    • Important: Orange background
    • Moderate: Yellow background
    • Low: Blue background
  • Structured product listings
  • Formatted remediation steps
  • Clickable reference links
  • Professional card-style presentation

Severity Levels

The server recognizes the following CVSS v3 severity levels:

  • Critical: Immediate action required
  • Important: High priority patching needed
  • Moderate: Standard patching timeline
  • Low: Lower priority, patch when convenient

Supported CVE Years

The server can retrieve CVE information for any year that Red Hat has published CSAF data, typically covering:

  • Current year vulnerabilities
  • Historical CVEs from previous years
  • All Red Hat product security advisories

Error Handling

The server provides meaningful error messages for:

  • Invalid CVE format: Guidance on proper CVE ID formatting
  • CVE not found: Information when a CVE doesn't exist in Red Hat's feed
  • Network issues: Helpful messages for connectivity problems
  • Malformed responses: Graceful handling of API response issues

Security Context

This server provides access to public CVE information and does not require authentication. All CVE data retrieved is publicly available security information that Red Hat publishes as part of their commitment to transparency and security.

Keywords

mcp

FAQs

Package last updated on 16 Jul 2025

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts