Server data from the Official MCP Registry
Security scanning for websites, public repositories, and Open CLAW skills.
Security scanning for websites, public repositories, and Open CLAW skills.
Valid MCP server (2 strong, 4 medium validity signals). 2 code issues detected. 2 known CVEs in dependencies (0 critical, 2 high severity) Package registry verified. Imported from the Official MCP Registry. 2 finding(s) downgraded by scanner intelligence.
4 files analyzed · 5 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: CYBERLENS_API_KEY
Environment variable: CYBERLENS_API_BASE_URL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-shadoprizm-cyberlens-mcp-server": {
"env": {
"CYBERLENS_API_KEY": "your-cyberlens-api-key-here",
"CYBERLENS_API_BASE_URL": "your-cyberlens-api-base-url-here"
},
"args": [
"-y",
"@shadoprizm/cyberlens-mcp-server"
],
"command": "npx"
}
}
}From the project's GitHub README.
Security scanning for AI assistants and agentic coding workflows.
A Model Context Protocol (MCP) server that gives AI assistants the ability to scan websites, public repositories, and Open CLAW skills for security vulnerabilities. It's purpose-built for the agentic coding era, with native support for scanning skill packages before you install them.
When connected to an AI assistant (Claude Desktop, VS Code, etc.), this MCP server adds security scanning tools that the assistant can use during your conversation:
You: "I want to install this skill: https://clawhub.ai/skills/ontology"
Claude: I'll scan it for security issues first.
[PASS] CLAW Skill Security Scan: ontology v1.0.4
Security Score: 95/100
Files Analyzed: 5
Skill appears safe to install. Minor issues noted below.
1. [MEDIUM] File write operation
File: scripts/ontology.py:399
Fix: Ensure file writes are limited to expected directories.
The skill looks safe. It writes to the filesystem for its knowledge
graph storage, which is expected behaviour for this type of skill.
After the first npm release, the recommended install path is:
npx -y @shadoprizm/cyberlens-mcp-server
Before that, or for local development and manual builds:
git clone https://github.com/shadoprizm/cyberlens-mcp-server.git
cd cyberlens-mcp-server
npm install
npm run build
Claude Desktop -- add to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
{
"mcpServers": {
"cyberlens": {
"command": "npx",
"args": ["-y", "@shadoprizm/cyberlens-mcp-server"]
}
}
}
If you are running from a source checkout instead of npm:
{
"mcpServers": {
"cyberlens": {
"command": "node",
"args": ["/absolute/path/to/cyberlens-mcp-server/dist/index.js"]
}
}
}
Claude Code -- add to your MCP settings or project configuration.
VS Code (Copilot/Continue) -- configure per your extension's MCP server settings.
Website tools work immediately without an account in local quick mode. That local mode covers roughly 15 core checks and returns results right away.
Connecting an account upgrades website scans to the full CyberLens cloud path with 70+ checks, scan history, and AI analysis. Repository and account-only tools still connect through the browser flow when needed.
When a repository or account-only tool needs an account, the MCP server:
cyberlensai.com to sign up or log in~/.cyberlens/mcp/config.jsonYou can also trigger the same flow explicitly:
You: "Connect my CyberLens account"
This opens your browser to cyberlensai.com where you can sign up (free) or log in. Your API key is saved locally at ~/.cyberlens/mcp/config.json and used for all future scans.
Free accounts include 5 scans/month. No credit card required.
You can also set the
CYBERLENS_API_KEYenvironment variable in the MCP config instead of using the browser flow.
If a cloud website scan hits its monthly quota, the MCP server opens the CyberLens pricing page automatically and falls back to the local quick scan instead of hard-failing. Repository scans still require cloud quota.
| Tool | Description | Requires API Key |
|---|---|---|
connect_account | Opens browser to sign up/log in and saves your API key locally | No |
get_account_quota | Shows your current plan and remaining website/repository scan quota; auto-connects on first use if needed | Yes |
| Tool | Description | Requires API Key |
|---|---|---|
scan_claw_skill | Download and analyse a CLAW Hub or direct skill package for security issues | No |
validate_claw_skill | Validate a skill manifest against security best practices | No |
| Tool | Description | Requires API Key |
|---|---|---|
scan_website | Local quick website scan without an account; full cloud scan when connected; local fallback if website cloud quota is exhausted | No for local, Yes for full cloud |
scan_repository | Public repository security scan for GitHub, GitLab, Bitbucket, and supported ZIP targets; auto-connects on first use if needed | Yes |
get_scan_results | Retrieve detailed findings from a completed cloud scan; auto-connects on first use if needed | Yes |
get_security_score | Local quick website score without an account; full cloud score when connected | No for local, Yes for full cloud |
| Tool | Description | Requires API Key |
|---|---|---|
get_remediation_guide | Built-in local remediation playbooks for common CWEs and vulnerability classes | No |
get_scan_transparency | Honest report of the MCP server's local checks and live cloud endpoints | No |
When you provide a CLAW skill URL, the MCP server:
https://clawhub.ai/skills/skill-name), direct download links (https://*.convex.site/api/v1/download?slug=name), or any URL pointing to a skill zip_meta.json and SKILL.md for completenesseval() usage, shell command execution, insecure HTTP requests, file deletion operations, pickle deserialisation, and moreThis entire process runs locally -- no API key is required and your code is never sent to an external server.
scan_website and get_security_score now have two honest modes:
If a user asks for a full or database website scan without an account, the MCP server still returns the local quick scan and says that the requested cloud-only mode was not available.
If a connected user runs out of website cloud quota, CyberLens falls back to the local quick scan automatically and opens the pricing page with an upgrade link.
https://clawhub.ai/skills/ontology --> Resolves automatically
https://clawhub.ai/author/skill-name --> Resolves automatically
https://*.convex.site/api/v1/download?slug=x --> Direct download
src/
index.ts MCP server, tool handlers, output formatting
auth.ts Browser-based connect flow, config file management
client.ts REST API client for live scan and quota endpoints
remediation-guides.ts Local CWE and vulnerability remediation guidance
schemas.ts Zod input validation schemas
skill-scanner.ts Local CLAW skill analyser (download, extract, scan)
skill-validation.ts Local CLAW manifest validation
transparency.ts Local transparency report for scan coverage
Key design decisions:
fetch and X-API-Key header/scan, /scan/{id}, /quota)# Build
npm run build
# Watch mode
npm run dev
# Run directly (for testing)
echo '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2024-11-05","capabilities":{},"clientInfo":{"name":"test","version":"1.0.0"}}}' | node dist/index.js
| Variable | Required | Default | Description |
|---|---|---|---|
CYBERLENS_API_KEY | No | -- | API key (alternative to browser connect flow) |
CYBERLENS_API_BASE_URL | No | https://api.cyberlensai.com/functions/v1/public-api-scan | API endpoint override |
This repository is prepared for npm + MCP Registry publication as:
@shadoprizm/cyberlens-mcp-serverio.github.shadoprizm/cyberlens-mcp-serverTypical release flow:
# 1. Bump the version
npm version patch
# 2. Publish the package to npm
npm publish
# 3. Authenticate with the MCP Registry
mcp-publisher login github
# 4. Publish server.json to the MCP Registry
mcp-publisher publish
The registry metadata lives in the root server.json file and the npm ownership check uses the mcpName field in package.json.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.
by Microsoft · Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace · Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm — conversationally
by mcp-marketplace · Finance
Free stock data and market news for any MCP-compatible AI assistant.