Automotive cybersecurity: R155/R156 regulations, ISO 21434, TISAX, AUTOSAR, Chinese GB/T
Automotive cybersecurity: R155/R156 regulations, ISO 21434, TISAX, AUTOSAR, Chinese GB/T
Valid MCP server (2 strong, 2 medium validity signals). 2 known CVEs in dependencies (0 critical, 2 high severity) Package registry verified. Imported from the Official MCP Registry. Trust signals: trusted author (203/206 approved).
5 files analyzed Β· 3 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-ansvar-systems-automotive-cybersecurity": {
"args": [
"-y",
"@ansvar/automotive-cybersecurity-mcp"
],
"command": "npx"
}
}
}From the project's GitHub README.
Complete R155/R156 Content - Production-ready with full regulation text from official UNECE sources.
Stop wasting hours searching through PDF regulations. Ask Claude about automotive cybersecurity requirements in natural language and get instant, accurate answers with source references.
A Model Context Protocol (MCP) server that gives Claude direct access to UNECE R155/R156 regulations and ISO 21434 guidance, enabling AI-powered compliance workflows.
The Problem:
The Solution:
Who This Is For:
Connect directly to the hosted version β zero dependencies, nothing to install.
Endpoint: https://mcp.ansvar.eu/automotive/mcp
| Client | How to Connect |
|---|---|
| Claude.ai | Settings > Connectors > Add Integration > paste URL |
| Claude Code | claude mcp add automotive-cybersecurity --transport http https://mcp.ansvar.eu/automotive/mcp |
| Claude Desktop | Add to config (see below) |
| GitHub Copilot | Add to VS Code settings (see below) |
Claude Desktop β add to claude_desktop_config.json:
{
"mcpServers": {
"automotive-cybersecurity": {
"type": "url",
"url": "https://mcp.ansvar.eu/automotive/mcp"
}
}
}
GitHub Copilot β add to VS Code settings.json:
{
"github.copilot.chat.mcp.servers": {
"automotive-cybersecurity": {
"type": "http",
"url": "https://mcp.ansvar.eu/automotive/mcp"
}
}
}
npx @ansvar/automotive-cybersecurity-mcp
Claude Desktop β add to claude_desktop_config.json:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
{
"mcpServers": {
"automotive-cybersecurity": {
"command": "npx",
"args": ["-y", "@ansvar/automotive-cybersecurity-mcp"]
}
}
}
Cursor / VS Code:
{
"mcp.servers": {
"automotive-cybersecurity": {
"command": "npx",
"args": ["-y", "@ansvar/automotive-cybersecurity-mcp"]
}
}
}
Preparing for Type Approval:
"What documentation does R155 require for CSMS approval?"
"Show me the R155 Annex 4 certificate template"
"List all R155 requirements for vulnerability management"
Compliance Analysis:
"Search R155 for requirements about incident response"
"What does R156 Article 7 require for software update assessment?"
"Compare R155 and R156 approval processes"
Documentation Generation:
"Generate a compliance checklist from R155 Article 7"
"Create a gap analysis template for R155"
"What evidence does R155 require for type approval?"
Training & Education:
"Explain R155 Article 7.2.2.2 in simple terms"
"What are the key differences between R155 Revision 1 and 2?"
"Create quiz questions from R155 CSMS requirements"
Direct Source Access: Content comes directly from official UNECE regulation documents, not LLM training data or paraphrased summaries.
Instant Retrieval: Sub-millisecond full-text search across 294KB of regulation content eliminates PDF scrolling.
Accurate Citations: Every answer includes exact article references (e.g., "R155 Article 7.2.2.2") for audit trails.
Always Current: Database includes complete R155/R156 Revision 2 (effective 2024-07-07) from official sources.
| Task | Traditional Approach | With Automotive MCP |
|---|---|---|
| Find specific requirement | Download PDF β Ctrl+F β Read context β Verify article | Ask Claude β Get answer with citation |
| Time | 15-30 minutes | 10 seconds |
| Prepare for audit | Read 200 pages β Highlight β Create checklist β Cross-reference | Ask for requirements β Generate checklist β Done |
| Time | 2-3 days | 30 minutes |
| Answer RFQ question | Search PDF β Read articles β Draft response β Verify | Ask Claude β Get exact requirement β Copy citation |
| Time | 1-2 hours | 2 minutes |
| Train engineers | Create slides β Extract requirements β Format β Present | Ask for explanations β Generate quiz β Export |
| Time | 1 week | 2 hours |
| Cost | $200-400/hour consultant | $0 (open source) |
ROI: First question answered = immediate payback. 10 questions/month = $36,000/year saved.
This MCP server enables AI assistants to access and reason about automotive cybersecurity requirements, helping with:
The server uses a read-only SQLite database with full-text search (FTS5) to provide fast, accurate access to regulatory content.
Production Infrastructure:
list_sources, get_requirement, search_requirements, list_work_products, export_compliance_matrixComplete Content:
No installation needed! Use directly in Claude Desktop:
macOS: Edit ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: Edit %APPDATA%\Claude\claude_desktop_config.json
{
"mcpServers": {
"automotive-cybersecurity": {
"command": "npx",
"args": ["-y", "@ansvar/automotive-cybersecurity-mcp"]
}
}
}
Restart Claude Desktop after editing the config.
npm install -g @ansvar/automotive-cybersecurity-mcp
Then in Claude Desktop config:
{
"mcpServers": {
"automotive-cybersecurity": {
"command": "automotive-cybersecurity-mcp"
}
}
}
# Clone the repository
git clone https://github.com/ansvar-ai/automotive-mcp.git
cd automotive-mcp
# Install dependencies and build
npm install
npm run build:db # Build SQLite database
npm run build # Compile TypeScript
Then in Claude Desktop config:
{
"mcpServers": {
"automotive-cybersecurity": {
"command": "node",
"args": ["/absolute/path/to/automotive-mcp/dist/index.js"]
}
}
}
Replace /absolute/path/to/automotive-mcp with your installation path.
After restarting Claude Desktop, ask:
What automotive cybersecurity sources are available?
Claude should use the list_sources tool and show R155, R156, and ISO 21434.
Complete UNECE Regulations:
ISO 21434 Guidance:
Additional Frameworks:
| Source | Items | Content | Size |
|---|---|---|---|
| UNECE R155 | 17 | Articles 1-12, Annexes 1-5 | 223KB |
| UNECE R156 | 16 | Articles 1-12, Annexes 1-4 | 64KB |
| ISO 21434 | 25 | Clauses 5-15, TARA sub-clauses, Annexes A/D-H | ~25KB |
| VDA TISAX | 14 | Control areas 1-13 + Prototype protection | ~15KB |
| SAE J3061 | 7 | Lifecycle clauses 5-10 + Annex A | ~8KB |
| AUTOSAR | 8 | SecOC, CSM, KeyM, IdsM, Secure Boot, etc. | ~10KB |
| Chinese GB/T | 12 | GB/T 40857, 40856, 40855, GB 44495, CCC, V2X | ~15KB |
| Total | 99 | 5 standards + 2 regulations | ~360KB |
Key R155 Content:
Key R156 Content:
The server provides 5 MCP tools for accessing automotive cybersecurity requirements:
List available automotive cybersecurity regulations and standards.
Input:
source_type (optional): Filter by type - "regulation", "standard", or "all" (default: "all")Example:
{
"source_type": "regulation"
}
Returns:
{
"sources": [
{
"id": "r155",
"name": "UN Regulation No. 155",
"version": "Revision 2",
"type": "regulation",
"description": "Cyber Security and Cyber Security Management System",
"item_count": 1,
"full_text_available": true
},
{
"id": "r156",
"name": "UN Regulation No. 156",
"version": "Revision 2",
"type": "regulation",
"description": "Software Update and Software Updates Management System",
"item_count": 0,
"full_text_available": true
},
{
"id": "iso_21434",
"name": "ISO/SAE 21434:2021",
"version": "2021",
"type": "standard",
"description": "Road vehicles β Cybersecurity engineering",
"item_count": 1,
"full_text_available": false
}
]
}
Retrieve a specific regulation article or standard clause with optional cross-framework mappings.
Input:
source (required): Source ID (e.g., "r155", "r156", "iso_21434")reference (required): Article/clause reference (e.g., "7.2.2.2", "9.3")include_mappings (optional): Include related requirements (default: false)Example:
{
"source": "r155",
"reference": "7.2.2.2",
"include_mappings": true
}
Returns:
{
"requirement": {
"source": "r155",
"reference": "7.2.2.2",
"title": "Cybersecurity processes",
"text": "The manufacturer shall demonstrate that the vehicle type...",
"section": "7.2.2.2"
},
"mappings": [
{
"target_source": "iso_21434",
"target_reference": "9.3",
"relationship": "implements"
}
]
}
Full-text search across all regulations and standards using FTS5 with BM25 ranking.
Input:
query (required): Search query textsources (optional): Filter to specific sources (e.g., ["r155", "iso_21434"])limit (optional): Maximum results (default: 10)Example:
{
"query": "vulnerability management",
"sources": ["r155"],
"limit": 5
}
Returns:
{
"results": [
{
"source": "r155",
"reference": "7.2.2.2",
"title": "Cybersecurity processes",
"snippet": "...processes for vulnerability management and...",
"rank": 1.245
}
],
"total": 5
}
List ISO 21434 work products (deliverables) required for cybersecurity engineering.
Input:
clause_id (optional): Filter to specific clause (e.g., "15" for TARA, "6" for cybersecurity case)phase (optional): Filter by lifecycle phase - organizational, project, continual, concept, development, validation, production, operations, decommissioning, taraExample:
{
"phase": "tara"
}
Returns:
{
"work_products": [
{
"id": "WP-15-01",
"name": "TARA report",
"clause_id": "15",
"clause_title": "Threat analysis and risk assessment (TARA)",
"cal_relevant": true,
"r155_refs": ["5.1.1(b)", "7.2.2.2(b)", "7.3.3"]
}
],
"summary": {
"total_work_products": 44,
"clauses_covered": 19,
"cal_relevant_count": 31
}
}
Generate a compliance traceability matrix for audit documentation.
Input:
regulation (optional): "r155" or "r156" (default: "r155")format (optional): "markdown" or "csv" (default: "markdown")include_guidance (optional): Include ISO 21434 guidance summariesExample:
{
"regulation": "r155",
"format": "csv"
}
Returns:
{
"format": "csv",
"content": "Requirement,Title,ISO 21434 Clauses,Work Products,Status\n\"R155 7\",\"Specifications\",\"15, 8, 6...\",\"WP-15-01...\",Mapped",
"statistics": {
"total_requirements": 12,
"mapped_requirements": 2,
"coverage_percent": 17,
"unique_work_products": 36
}
}
This MCP server is built to production standards:
See QUALITY_ASSESSMENT_REPORT.md for detailed test results.
Scenario: Your OEM is 6 weeks from UNECE R155 type approval audit. You need to know every requirement.
Before (Manual Process):
With This MCP:
You: "List all R155 requirements related to vulnerability management"
Claude: "R155 has several vulnerability management requirements:
π Article 7.2.2.2(g) - Vulnerability Management
The CSMS shall include processes for managing vulnerabilities...
[Full text with exact reference]
π Article 7.2.2.2(h) - Security Updates
Procedures for providing security updates...
[Full text with exact reference]
I found these by searching R155 for 'vulnerability' and related terms."
Time: 30 seconds
Scenario: You've implemented ISO 21434 clause 9.3. Customer asks: "Does this satisfy R155 requirements?"
Before:
With This MCP:
You: "Show me ISO 21434 clause 9.3 and which R155 requirements it satisfies"
Claude: "ISO 21434 Clause 9.3 - Vulnerability Analysis
[Guidance text]
This clause directly satisfies these R155 requirements:
β
R155 Article 7.2.2.2(g) - Vulnerability management processes
β
R155 Article 7.2.2.2(h) - Security update procedures
The mapping shows your ISO 21434 implementation addresses the R155 type approval requirements."
Time: 15 seconds
Scenario: Auditor asks: "Show me your CSMS compliance matrix for R155 Article 7."
Before:
With This MCP:
You: "Create a compliance traceability matrix for R155 Article 7 requirements"
Claude: [Generates formatted markdown table]
| R155 Requirement | Description | Our Implementation | Status |
|-----------------|-------------|-------------------|--------|
| 7.2.2.2(a) | Risk assessment | TARA Process Doc v2.1 | β
|
| 7.2.2.2(b) | Risk treatment | Security Architecture v3.0 | β
|
| 7.2.2.2(g) | Vulnerability mgmt | VMP-001 Procedure | β
|
...
You can now add your implementation details to the template.
Time: 2 minutes + your data entry
Scenario: Email from customer: "Please confirm compliance with R155 Article 7.2.2.2 paragraph (e)."
Before:
With This MCP:
You: "What is R155 Article 7.2.2.2 paragraph (e)?"
Claude: "R155 Article 7.2.2.2(e) requires:
'Management of security events including tools, procedures and forensic data'
This means your CSMS must have:
- Security event monitoring tools (SIEM, IDS, etc.)
- Incident response procedures
- Forensic data collection and retention
- Event analysis and reporting processes
This is part of the CSMS operational requirements."
Time: 10 seconds
Scenario: New engineer asks: "What's the difference between R155 and ISO 21434?"
Before:
With This MCP:
You: "Explain the difference between R155 and ISO 21434"
Claude: "Based on the sources:
π UNECE R155 (Regulation):
- Legal requirement for vehicle type approval in EU/Asia
- Focus: What you MUST have (CSMS, processes, documentation)
- Enforced by: Government regulators during type approval
- Consequence: Can't sell vehicles without it
π ISO 21434 (Standard):
- Industry best practice (not legally required)
- Focus: How to implement automotive cybersecurity engineering
- Provides: Detailed processes, methods, work products
- Used to: Demonstrate compliance with R155
Relationship: R155 says 'you must have a CSMS', ISO 21434 tells you how to build one."
Time: Immediate
| Task | Manual Search | This MCP |
|---|---|---|
| Find specific requirement | Download PDF, Ctrl+F, read context | Ask Claude, get answer + context |
| Cross-reference frameworks | Open multiple PDFs, compare manually | Ask for mappings, instant results |
| Generate compliance matrix | Copy/paste from PDFs into Excel | Ask Claude to generate table |
| Answer "does X satisfy Y?" | Read both docs, hope you understand | Ask, get yes/no + explanation |
| Learn a regulation | Read 80+ page PDF | Ask questions, get summaries |
| Time for typical task | 30 min - 4 hours | 10 seconds - 2 minutes |
| Cost of consultant | $100-400/hour | Free (after setup) |
Key Advantage: Natural language + AI reasoning. Claude doesn't just search keywords - it understands context, relationships, and can synthesize information across multiple requirements.
This server works well with other MCP servers:
"Export R155 requirements as GitHub issues for our compliance tracking"
search_requirements to find relevant requirements"Save all ISO 21434 work products to a structured directory"
list_sources and get_requirement to retrieve content"Find industry best practices for implementing R155 vulnerability management"
get_requirement to understand R155 requirementsautomotive-mcp/
βββ src/
β βββ index.ts # MCP server entry point
β βββ types/ # TypeScript type definitions
β β βββ index.ts
β βββ tools/ # Tool implementations
β βββ registry.ts # Shared tool registry
β βββ list.ts # list_sources tool
β βββ get.ts # get_requirement tool
β βββ search.ts # search_requirements tool
βββ data/
β βββ seed/ # JSON seed data
β β βββ regulations.json
β β βββ standards.json
β βββ automotive.db # Generated SQLite database (not in git)
βββ scripts/
β βββ build-db.ts # Database build script
βββ tests/ # Vitest tests
βββ dist/ # Compiled TypeScript (not in git)
# Compile TypeScript
npm run build
# Build database from seed data
npm run build:db
# Both
npm run build && npm run build:db
# Run all tests once
npm test
# Run tests in watch mode
npm run test:watch
# Run with auto-reload on file changes
npm run dev
The MCP Inspector provides a visual interface for testing tools:
npm run build
npx @modelcontextprotocol/inspector node dist/index.js
This opens a web interface where you can:
The database uses SQLite with FTS5 for full-text search:
Tables:
sources - Regulation/standard metadatarequirements - Individual articles/clausesrequirements_fts - FTS5 virtual table for searchmappings - Cross-framework relationships (future)Key Features:
To add new regulations or standards:
data/seed/:{
"id": "new_regulation",
"name": "New Regulation",
"full_name": "Full title...",
"version": "2024",
"type": "regulation",
"issuing_body": "Authority",
"items": [
{
"reference": "1.1",
"title": "Scope",
"text": "Full text...",
"section": "1"
}
]
}
npm run build:db
npm test
AUTOMOTIVE_CYBERSEC_DB_PATH - Override database location (default: data/automotive.db)We maintain a family of MCP servers for compliance and security professionals:
| Server | Description | Install |
|---|---|---|
| EU Regulations | 47 EU regulations (GDPR, AI Act, DORA, NIS2, MiFID II, eIDAS, MDR...) | npx @ansvar/eu-regulations-mcp |
| US Regulations | HIPAA, CCPA, SOX, GLBA, FERPA, COPPA, FDA 21 CFR Part 11, state privacy laws | npx @ansvar/us-regulations-mcp |
| Security Controls | 1,451 controls across 28 frameworks (ISO 27001, NIST CSF, PCI DSS, CMMC...) | pipx install security-controls-mcp |
| OT Security | IEC 62443, NIST 800-82, MITRE ATT&CK for ICS | npx @ansvar/ot-security-mcp |
| Sanctions | Offline sanctions screening with OpenSanctions (30+ lists) | pip install ansvar-sanctions-mcp |
Browse all projects: ansvar.eu/open-source
This MCP server is licensed under the Apache License 2.0. See LICENSE file for details.
Important: This license covers the software only. Regulatory content and standards have their own licensing terms as described above.
Contributions welcome! Please:
npm test passesYes, for reference. The regulations (R155/R156) are public domain. However, always verify critical compliance decisions with the official source documents. This tool helps you work faster, not replace your judgment.
25 clauses with expert guidance. ISO 21434 is copyrightedβwe include clause titles, expert guidance summaries, work products, and R155 mappings (not full text). This covers all major clauses (5-15) plus key annexes. R155/R156 regulations are public domain and fully included.
Yes. Apache 2.0 license allows commercial use. Many consultants use this to speed up their R155/ISO 21434 advisory work.
Not included (copyright). We provide clause IDs, titles, and expert guidance for ISO 21434. The full standard text requires a license from ISO. This approach respects copyright while still being useful.
Claude Desktop only for now. MCP is currently supported in Claude Desktop. Once Anthropic adds MCP support to web/API, this will work there too (no changes needed).
Automatic. If you install via npm/npx, running npm update -g @ansvar/automotive-cybersecurity-mcp (or just restarting Claude Desktop with npx) will get the latest version. v1.0.0 includes all Phase 1 & 2 features.
Yes. Fork the repo and modify data/seed/*.json files to add internal notes, then rebuild the database with npm run build:db.
No. Everything runs locally on your machine. The database is read-only SQLite. No network calls, no telemetry, no data collection.
For issues, questions, or contributions:
Current Implementation:
Not Legal Advice: This tool provides access to regulatory text for informational purposes only. It does not constitute legal advice, compliance certification, or professional consultation. For official compliance decisions, consult qualified legal counsel or type approval authorities.
Official Sources: Always verify critical requirements against official UNECE publications and your jurisdiction's implementation of regulations.
Type Approval: Type approval decisions are made by recognized technical services and approval authorities, not by AI tools.
Claude Desktop: This MCP can return large regulation articles (e.g., R155 Article 7 is 22KB). Be mindful of token usage if on limited plans.
Best Practice: Use specific queries rather than requesting entire regulations at once.
ISO 21434 Content: Full ISO 21434 text is copyright-protected and not included. We provide expert guidance summaries only. Purchase the official standard from ISO for complete requirements.
Official Standard: https://www.iso.org/standard/70918.html
π Major Release - Complete Automotive Compliance Platform
Features:
Content (99 items across 5 standards + 2 regulations):
Global Market Support:
Features:
This project includes UNECE R155 and R156 regulation content sourced from the EU Compliance MCP project by Ansvar Systems. The EU Compliance MCP provides comprehensive access to 37 EU regulations including automotive cybersecurity standards.
Data Attribution:
We thank the EU Compliance MCP team for their excellent work in making EU and UNECE regulations accessible via MCP protocol.
This server is read-only and does not require a login account for functional review. For directory review, use the bundled dataset and these sample prompts:
The default server runtime is read-only and can be deployed without authentication. If you deploy a remote authenticated endpoint, use OAuth 2.0 over TLS with certificates from recognized authorities.
See PRIVACY.md for data handling and retention notes.
npm run build completed successfully.data/automotive.db exists and the process can read it.R155, R156, or ISO 21434) and narrow from there.Be the first to review this server!
by Toleno Β· Developer Tools
Toleno Network MCP Server β Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace Β· Developer Tools
Create, build, and publish Python MCP servers to PyPI β conversationally.
by Microsoft Β· Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace Β· Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm β conversationally
by mcp-marketplace Β· Finance
Free stock data and market news for any MCP-compatible AI assistant.
by Taylorwilsdon Β· Productivity
Control Gmail, Calendar, Docs, Sheets, Drive, and more from your AI