
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
framework-mcp
Advanced tools
Pure Data Provider architecture serving authentic CIS Controls Framework data via MCP and HTTP API. Empowers LLMs with authoritative safeguards data for analysis. Supports Microsoft Copilot custom connectors and DigitalOcean App Services deployment.
A Model Context Protocol (MCP) server providing authoritative CIS Controls Framework data to empower LLMs with sophisticated, context-aware vendor capability analysis. This Pure Data Provider architecture enables security professionals to perform flexible, intelligent assessment of vendor tool capabilities against specific CIS Control safeguards.
This MCP server empowers security teams to:
Capability Role | Description | LLM Analysis Approach |
---|---|---|
FULL | Complete implementation of safeguard requirements | LLMs assess comprehensive coverage against detailed safeguard data |
PARTIAL | Limited scope implementation with clear boundaries | LLMs identify scope limitations and coverage gaps |
FACILITATES | Enhancement capabilities that enable others to implement safeguards better/faster/stronger | LLMs recognize facilitation patterns and indirect support capabilities |
GOVERNANCE | Policy/process management and oversight capabilities | LLMs evaluate governance elements and process management features |
VALIDATES | Verification capabilities providing evidence and reporting | LLMs assess audit, monitoring, and reporting capabilities |
The server uses the CIS Controls visual framework with color-coded categorization:
npm install -g framework-mcp
npm update -g framework-mcp
Or reinstall to get the latest version:
npm uninstall -g framework-mcp
npm install -g framework-mcp
git clone https://github.com/therealcybermattlee/FrameworkMCP.git
cd FrameworkMCP
npm install
npm run build
# Deploy using the included configuration
doctl apps create .do/app.yaml
railway login
railway up
Connect your GitHub repository and use:
npm install && npm run build
npm run start:http
Deploy to any cloud platform and use the included swagger.json
for Copilot integration.
Add to your MCP configuration file (~/.config/claude-code/mcp.json
):
{
"mcpServers": {
"framework-analyzer": {
"command": "node",
"args": ["/path/to/FrameworkMCP/dist/index.js"],
"env": {}
}
}
}
Deploy the Framework MCP HTTP API to any cloud platform (DigitalOcean, Railway, Render, etc.)
swagger.json
file from this repository/health
endpoint to verify connectivityIn your Copilot, create actions for capability assessment:
Primary Action - Validate Vendor Capability:
Action: Validate Vendor Mapping
Description: Validate vendor capability claims against CIS Controls through content analysis
Connector: Framework MCP Custom Connector
Operation: validateVendorMapping
Parameters:
- vendor_name: {User provided vendor name}
- safeguard_id: {CIS safeguard ID like "1.1"}
- claimed_capability: {full|partial|facilitates|governance|validates}
- supporting_text: {Vendor response text}
Secondary Action - Analyze Response:
Action: Analyze Vendor Response
Description: Determine appropriate capability role for vendor response
Connector: Framework MCP Custom Connector
Operation: analyzeVendorResponse
Parameters:
- vendor_name: {User provided vendor name}
- safeguard_id: {CIS safeguard ID}
- response_text: {Vendor response to analyze}
Once configured, users can interact with your Copilot:
"Validate this vendor capability: CrowdStrike Falcon claims FULL coverage for safeguard 1.1 with this response: 'Our platform provides comprehensive enterprise asset inventory with real-time discovery, automated classification, and continuous monitoring of all hardware and software assets.'"
"Analyze this vendor response for safeguard 5.1: Microsoft Entra ID - 'We provide centralized identity management with automated user provisioning, role-based access controls, and integration with all major business applications.'"
"What are the requirements for CIS safeguard 6.3?"
# For MCP usage
claude-code "List available CIS Control safeguards"
# For HTTP API usage
curl https://your-api-url.com/health
# For Copilot testing
curl -X POST https://your-api-url.com/api/validate-vendor-mapping \
-H "Content-Type: application/json" \
-d '{"vendor_name":"Test Vendor","safeguard_id":"1.1","claimed_capability":"facilitates","supporting_text":"We provide supplemental asset tracking capabilities that enhance existing inventory systems."}'
claude-code "Get safeguard details for 5.1, then analyze this vendor response: SecureIAM Corp - 'Our tool is a full identity provider with comprehensive account management. We maintain detailed user inventories including names, usernames, departments, and access rights. Automated quarterly reviews ensure all accounts are authorized and compliant.' Determine appropriate capability role and provide confidence assessment."
claude-code "Get safeguard 8.2 details. For a high-risk financial services environment, analyze this logging solution: 'We collect endpoint telemetry and forward logs to SIEM platforms.' Consider regulatory requirements (SOX, PCI-DSS) and determine capability role with implementation recommendations."
claude-code "Get safeguard 1.1 details. Compare these asset management solutions and rank by implementation completeness for a 500-employee company: 1) Lansweeper: 'Complete network discovery and automated inventory' 2) ServiceNow: 'CMDB with manual asset entry workflows' 3) Microsoft Intune: 'Managed device tracking with Azure AD integration'. Provide deployment complexity assessment."
Create vendors.csv
:
vendor,safeguard,response
VendorA,5.1,"Complete IAM solution with policy management and quarterly reviews"
VendorB,5.1,"Basic user directory with manual account tracking"
VendorC,6.3,"MFA enforcement for all external applications with SSO integration"
claude-code "Get details for safeguards referenced in vendors.csv. Analyze each vendor response, determine capability roles, and provide implementation roadmap recommendations based on organizational gaps."
claude-code "Get safeguard 12.4 details. This vendor claims FULL capability for network boundary monitoring: 'We monitor all network traffic, identify unauthorized devices, and generate real-time alerts.' Validate this claim against the specific safeguard requirements and provide evidence-based assessment."
claude-code "Get safeguard 11.1 details. For a healthcare organization with HIPAA requirements, assess Veeam Backup's capability: 'Automated daily backups with 99.9% recovery success rate and quarterly recovery testing.' Focus on governance and validation aspects."
ASSESSMENT: SecureIAM Corp - Safeguard 5.1 Analysis
CAPABILITY DETERMINATION: FULL + GOVERNANCE + VALIDATES
CONFIDENCE: 87%
ANALYSIS:
Based on safeguard 5.1 requirements for comprehensive account inventory management:
✅ CORE REQUIREMENTS COVERAGE:
- Complete user inventory (names, usernames, departments)
- Access rights tracking and management
- Identity provider capabilities with centralized management
✅ GOVERNANCE ELEMENTS:
- Automated quarterly review processes
- Compliance verification workflows
- Policy enforcement capabilities
✅ VALIDATION CAPABILITIES:
- Continuous monitoring and reporting
- Authorization verification
- Compliance status tracking
EVIDENCE QUALITY: High - Specific implementation details provided
SCOPE DEFINITION: Comprehensive enterprise account management
RECOMMENDATION: Strong FULL capability alignment with additional governance and validation roles. Suitable for enterprise Implementation Group 2-3 deployments.
COMPARATIVE ANALYSIS: Asset Management Solutions for Safeguard 1.1
RANKING BY IMPLEMENTATION COMPLETENESS:
1. 🥇 LANSWEEPER (FULL + VALIDATES)
- Comprehensive automated discovery
- Network-wide asset visibility
- Strong for 500-employee deployment
- Implementation: Medium complexity
2. 🥈 MICROSOFT INTUNE (PARTIAL + GOVERNANCE)
- Managed device focus (limited scope)
- Strong Azure AD integration
- Governance capabilities present
- Implementation: Low complexity (if using Microsoft stack)
3. 🥉 SERVICENOW (FACILITATES + GOVERNANCE)
- CMDB foundation requires manual processes
- Strong workflow and governance features
- Facilitates comprehensive asset management
- Implementation: High complexity
RECOMMENDATION: Lansweeper provides best immediate coverage for IG1 requirements. Consider Intune if Microsoft-centric environment, ServiceNow for complex enterprise with mature processes.
HIPAA-FOCUSED ANALYSIS: Veeam Backup vs Safeguard 11.1
CAPABILITY: FULL + VALIDATES
COMPLIANCE CONFIDENCE: 92%
HIPAA CONSIDERATIONS:
✅ Recovery time objectives meet healthcare uptime requirements
✅ Quarterly testing demonstrates due diligence
✅ 99.9% success rate supports business continuity
GOVERNANCE ALIGNMENT:
- Documented recovery procedures (required for HIPAA)
- Regular testing and validation processes
- Performance metrics and reporting
GAPS TO ADDRESS:
- Verify encryption at rest/in transit for PHI
- Confirm audit logging capabilities
- Validate access controls for backup systems
IMPLEMENTATION RECOMMENDATION: Strong foundation for HIPAA compliance. Supplement with documented encryption policies and access control procedures.
Tool | Description |
---|---|
get_safeguard_details | PRIMARY Get detailed safeguard breakdown with structured CIS data for LLM analysis |
list_available_safeguards | List all available CIS safeguards (153 total) for framework exploration |
Pure Data Provider Architecture: Framework MCP provides authoritative CIS Controls data while LLMs perform sophisticated, context-aware capability analysis with unlimited flexibility.
[
{
"name": "VendorName",
"safeguard_id": "5.1",
"response": "Vendor response text..."
}
]
vendor,safeguard,response
VendorName,5.1,"Response text..."
Vendor: VendorName - Safeguard: 5.1
Response text here...
Vendor: AnotherVendor - Safeguard: 6.3
Another response...
Framework MCP v1.4.0's Pure Data Provider architecture empowers LLMs to perform sophisticated vendor capability analysis with unprecedented flexibility and intelligence.
Advantage | Description | LLM Capability |
---|---|---|
Context Awareness | Analysis considers industry, risk profile, and organizational needs | LLMs understand sector-specific requirements and compliance frameworks |
Analytical Flexibility | Apply custom methodologies and assessment criteria | Multiple analysis approaches: strict compliance, risk-based, comparative |
Transparent Reasoning | Complete visibility into analysis logic and evidence evaluation | LLMs explain their reasoning and provide detailed justifications |
Adaptive Intelligence | Dynamic assessment based on evolving requirements | LLMs can adjust analysis based on new information or changing priorities |
Natural Language | Complex analysis requests in plain English | No need for rigid tool parameters or predefined validation rules |
Multi-Dimensional Assessment: LLMs can simultaneously evaluate:
Advanced Analysis Patterns:
# Custom compliance-focused analysis
claude-code "Get safeguard 8.3 details. For PCI-DSS Level 1 compliance, assess Splunk Enterprise Security considering cardholder data environment requirements and provide implementation timeline recommendations."
# Technology stack integration assessment
claude-code "Get safeguard 16.1 details. We use Azure DevOps and GitHub. Analyze how SonarQube integrates with our pipeline for secure code analysis and recommend configuration best practices."
# Risk-based prioritization
claude-code "Get details for safeguards 13.1, 13.3, and 13.6. Our organization faces advanced persistent threats. Rank these network monitoring vendors by threat detection capability: 1) CrowdStrike Falcon 2) SentinelOne 3) Microsoft Defender for Endpoint."
Complete CIS Controls v8.1 Framework Implementation
git clone https://github.com/therealcybermattlee/FrameworkMCP.git
cd FrameworkMCP
npm install
npm run build
Edit src/core/safeguard-manager.ts
and add to the initializeSafeguards()
method:
"X.Y": {
id: "X.Y",
title: "Safeguard Title",
description: "Description...",
implementationGroup: "IG1",
governanceElements: [...], // Orange - MUST be met
coreRequirements: [...], // Green - The "what"
subTaxonomicalElements: [...], // Yellow - Sub-elements
implementationSuggestions: [...], // Gray - Suggestions
// ...
}
npm test
git checkout -b feature/amazing-feature
)git commit -m 'Add amazing feature'
)git push origin feature/amazing-feature
)Permission denied:
chmod +x dist/index.js
Module not found:
npm install
npm run build
MCP server not connecting:
This project is licensed under the Creative Commons Attribution 4.0 International License by Cyber RISE, Inc - see the LICENSE file for details.
You are free to:
Under the following terms:
Built with ❤️ for the cybersecurity community by Matt Lee
FAQs
Pure Data Provider architecture serving authentic CIS Controls Framework data via MCP and HTTP API. Empowers LLMs with authoritative safeguards data for analysis. Supports Microsoft Copilot custom connectors and DigitalOcean App Services deployment.
The npm package framework-mcp receives a total of 55 weekly downloads. As such, framework-mcp popularity was classified as not popular.
We found that framework-mcp demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.