Skip to main content

EPSS MCP Server - Retrieve CVE details and EPSS scores

Project description

EPSS MCP Project

The EPSS MCP Project is a powerful server designed to retrieve CVE details from the NVD API and fetch EPSS scores from the EPSS server. It provides users with comprehensive vulnerability information, including CVE descriptions, CWEs, CVSS scores, and EPSS percentiles, all in one place.

Features

  • Comprehensive CVE Information: Fetch detailed vulnerability data, including descriptions, CWEs, and CVSS scores, directly from the NVD API.
  • EPSS Integration: Retrieve EPSS scores and percentiles to assess the likelihood of exploitation for specific vulnerabilities.
  • MCP Server: Serve data through a robust and extensible MCP server for seamless integration with other tools.
  • Docker Support: Easily deploy the server using Docker for a consistent and portable runtime environment.
  • VS Code Compatibility: Integrate with VS Code MCP for enhanced developer workflows and real-time vulnerability insights.

Prerequisites

  • Python 3.13 or higher
  • Docker (optional, for containerized deployment)
  • An NVD API key (add it to the .env file as NVD_API_KEY)

Setup Instructions

1. Clone the Repository

git clone <repository-url>
cd epss-mcp-project

2. Install Dependencies

It is recommended to use a virtual environment. You can create one using venv or conda. Then, install the required packages:

pip install -r requirements.txt

3. Add Your NVD API Key

Create a .env file in the project root and add your NVD API key:

NVD_API_KEY=your-nvd-api-key

Usage

Installing via Smithery

To install EPSS Vulnerability Scoring Server for Claude Desktop automatically via Smithery:

npx -y @smithery/cli install @jgamblin/EPSS-MCP --client claude

Running the MCP Server Locally

To start the MCP server locally, run:

python epss_mcp.py

Once the server is running, you can make requests to retrieve CVE details by specifying the CVE ID.

Example Request

To get details for a specific CVE, use the following format:

GET /cve/<CVE-ID>

Replace <CVE-ID> with the actual CVE identifier (e.g., CVE-2022-1234).

Docker Deployment (for Open-WebUI)

If you want to run the MCP server in Open-WebUI, follow these steps:

1. Build the Docker Image

To build the Docker container, run:

docker build -t epss_mcp .

2. Run the Docker Container

Run the container and expose it on port 8000:

docker run -p 8000:8000 epss_mcp

The MCP server will now be accessible at http://localhost:8000.

WebUI Screenshot

Below is a screenshot of the MCP server running in the Open-WebUI:

EPSS MCP WebUI Screenshot

Suggested System Prompt for WebUI

When using the MCP server in Open-WebUI, you can configure the following system prompt to guide interactions:

You are a specialized AI Assistant focused on the Exploit Prediction Scoring System (EPSS). Your expertise lies in delivering and interpreting EPSS data, which includes daily updated probability scores (0-1) and percentiles for Common Vulnerabilities and Exposures (CVEs), indicating the likelihood of their exploitation in the wild within the next 30 days. You are to help cybersecurity professionals understand these predictions, compare them with other metrics like CVSS scores, and use this information to prioritize vulnerability remediation efforts effectively. Provide actionable, data-driven insights in a clear, technically accurate, professional, and solution-oriented manner.

Serving to VS Code MCP

To serve the MCP server to VS Code MCP, follow these steps:

  1. Add the Local Server to VS Code: Open your VS Code settings.json file and add the following configuration to register the local server:

    "mcp.servers": {
        "EPSS_MCP": {
            "type": "stdio",
            "command": "python",
            "args": [
                "/Github/EPSS-MCP/epss_mcp.py"
            ]
        }
    }
    

    Note: Make sure to update the args path to match the location of the epss_mcp.py file on your local machine.

  2. Connect to VS Code:

    • Open VS Code.
    • Install the Microsoft Copilot Labs extension if not already installed.
    • Ensure the MCP server is listed and active in the extension.
  3. Start Using the MCP Server: Once connected, VS Code will call the Python file directly to fetch CVE details and EPSS scores.

VS Code Screenshot

Below is a screenshot of the MCP server integrated with VS Code:

EPSS MCP VS Code Screenshot

Project Structure

epss-mcp-project
├── epss_mcp.py               # Main entry point for the MCP server
├── nvd_api.py                # Functions to interact with the NVD API
├── epss_api.py               # Functions to interact with the EPSS API
├── epss_mcp_test.py          # Test script for the MCP server
├── requirements.txt          # Project dependencies
├── Dockerfile                # Docker configuration
├── .env                      # Environment variables (e.g., API keys)
└── README.md                 # Project documentation

Contributing

Contributions are welcome! Please feel free to submit a pull request or open an issue for any enhancements or bug fixes.

License

This project is licensed under the MIT License. See the LICENSE file for more details.

smithery badge

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_jgamblin_epss_mcp-0.1.0.tar.gz (5.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

iflow_mcp_jgamblin_epss_mcp-0.1.0-py3-none-any.whl (13.6 kB view details)

Uploaded Python 3

File details

Details for the file iflow_mcp_jgamblin_epss_mcp-0.1.0.tar.gz.

File metadata

  • Download URL: iflow_mcp_jgamblin_epss_mcp-0.1.0.tar.gz
  • Upload date:
  • Size: 5.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.28 {"installer":{"name":"uv","version":"0.9.28","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_jgamblin_epss_mcp-0.1.0.tar.gz
Algorithm Hash digest
SHA256 fe5f3e5820ab2533743e6a722ec47e14ded005e89a58c877688d0b45de4594bd
MD5 0937ac384c7cd3acf6964f04fd2224c5
BLAKE2b-256 da4db219a3e0509481195b52d2011b99750ea026bcf6086a00453ae7a526c6c1

See more details on using hashes here.

File details

Details for the file iflow_mcp_jgamblin_epss_mcp-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_jgamblin_epss_mcp-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 13.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.28 {"installer":{"name":"uv","version":"0.9.28","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_jgamblin_epss_mcp-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 9c90352b1163fa3a0fc0320217a45bacfb9d9cbc599c1c31fa21d7c0f18944fd
MD5 66d26994ab74e675f5c9ea9a67bcdc7c
BLAKE2b-256 abdf7ecc17e00235f15951381a4b662c0de8467f9a1258c85c755970cc0a5406

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page