mcp-for-security
MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. Integrate security testing and penetration testing into AI workflows.
claude mcp add --transport stdio cyproxio-mcp-for-security docker run -i cyprox/mcp-for-security
How to use
MCP for Security exposes a collection of security testing tools via a unified MCP server interface. The Docker image cyprox/mcp-for-security bundles multiple security evaluation utilities (such as Amass, Nmap, Nuclei, Masscan, Shuffledns, and more) behind the MCP protocol, enabling clients to interact with each tool through standardized requests and responses. Use the MCP client to query, execute, and orchestrate these tools in automated workflows, threat intel pipelines, or interactive security assessments. The server is designed to streamline security reconnaissance, vulnerability discovery, and web/app security testing by providing consistent input/output formats across tools and simplifying integration with orchestration platforms.
How to install
Prerequisites:
- Docker installed on your host
- Basic familiarity with MCP clients and the command-line interface
Install and run:
-
Ensure Docker is running on your system.
-
Pull and run the MCP for Security image:
docker run -i cyprox/mcp-for-security
Note: The image may require additional runtime configuration depending on your environment. If you need to expose ports or mount volumes for persistent data, adjust the docker run options accordingly (e.g., -p for ports, -v for volumes).
-
Verify the server is up by using an MCP client to list available tools or perform a basic command against one of the included MCP endpoints.
If you prefer to integrate with an existing orchestration workflow, you can wrap the docker run command in a script or use a container orchestrator to manage the lifecycle of the MCP server.
Additional notes
Tips and considerations:
- The image exposes a suite of security tooling; each tool may have its own specific configuration requirements. Refer to the individual MCP documentation pages for each tool (as linked in the README) for usage details.
- When running in CI/CD or automated environments, pin a specific image tag to ensure reproducible builds (e.g., cyprox/mcp-for-security:v1.0).
- If you encounter port or networking issues, you may need to adjust Docker network settings or map necessary ports for tool outputs.
- Some tools generate substantial output; consider streaming or chunked responses where supported by your MCP client to avoid memory pressure.
- Review environment variables and mount points if tools require external data (wordlists, certificates, etc.).
Related MCP Servers
toolhive
ToolHive makes deploying MCP servers easy, secure and fun
pentesting s-checklist
A practical, community-driven checklist for pentesting MCP servers. Covers traffic analysis, tool-call behavior, namespace abuse, auth flows, and remote server risks. Maintained by Appsecco and licensed for remixing.
MCPHammer
MCP security testing framework for evaluating Model Context Protocol server vulnerabilities
mcp
Official MCP server for Paper's trading platform - enables AI assistants to interact with Paper's API
pentesting-cyber
🔐 50+ MCP Security Servers for AI-Powered Pentesting | Integrate Nmap, Burp Suite, Nuclei, Shodan, BloodHound, Semgrep, Trivy | Model Context Protocol for Cybersecurity
MCP-Penetration-testing
The ultimate OWASP MCP Top 10 security checklist and pentesting framework for Model Context Protocol (MCP), AI agents, and LLM-powered systems.