About
An MCP server that runs a Trivy security scan and outputs the results as a CycloneDX SBOM, enabling automated supply‑chain visibility in Model Context Protocol workflows.
Capabilities

Overview
The MCP SBOM Server is a specialized Model Context Protocol (MCP) service that bridges the gap between AI assistants and open‑source security tooling. It performs a Trivy vulnerability scan on a target project directory and outputs the results as an SBOM (Software Bill of Materials) in CycloneDX format. By exposing this workflow through MCP, AI assistants can request a comprehensive dependency inventory and vulnerability report without needing direct access to the underlying command‑line tools. This capability is especially valuable for developers who want to embed automated security checks into conversational or workflow‑driven AI interactions.
At its core, the server wraps Trivy—a widely adopted scanner that detects vulnerabilities, misconfigurations, and license issues—in a simple HTTP interface that follows the MCP specification. When an AI client sends a request, the server invokes Trivy against the specified directory, collects the raw scan output, and then transforms it into a CycloneDX SBOM. The CycloneDX format is an industry‑standard, machine‑readable representation of software components and their relationships, making the resulting artifact ready for downstream consumption by compliance tools, dependency‑management systems, or CI/CD pipelines.
Key capabilities include:
- Automated scanning: Trivy runs against the entire file system of a project, covering containers, files, and Kubernetes manifests.
- SBOM generation: The output is a fully‑formed CycloneDX XML/JSON document that lists every component, its version, and any identified vulnerabilities.
- MCP integration: The server exposes a single MCP endpoint that can be called by any compliant AI assistant, allowing seamless inclusion in chat‑based workflows or scripted pipelines.
- Cross‑platform support: While the documentation highlights Windows path handling, the server itself runs on any OS where Trivy and Node.js are available.
Typical use cases include:
- Security‑first development: Developers ask an AI assistant to “scan my project for vulnerabilities” and receive a ready‑to‑use SBOM that can be imported into GitHub Advanced Security or Snyk.
- Compliance reporting: Auditors can trigger the server from an AI workflow to generate up‑to‑date SBOMs for regulatory submissions.
- CI/CD integration: Continuous‑integration systems can invoke the MCP endpoint via an AI assistant, ensuring that every build is automatically scanned and the results are stored in a central artifact repository.
What sets this MCP server apart is its tight coupling of Trivy’s powerful scanning engine with the standardized CycloneDX SBOM format, all exposed through a lightweight MCP interface. Developers benefit from not having to write custom wrappers or parse raw Trivy output; instead, they can rely on the AI assistant to orchestrate scans and deliver structured security data that integrates cleanly into existing tooling ecosystems.
Related Servers
MindsDB MCP Server
Unified AI-driven data query across all sources
Homebrew Legacy Server
Legacy Homebrew repository split into core formulae and package manager
Daytona
Secure, elastic sandbox infrastructure for AI code execution
SafeLine WAF Server
Secure your web apps with a self‑hosted reverse‑proxy firewall
mediar-ai/screenpipe
MCP Server: mediar-ai/screenpipe
Skyvern
MCP Server: Skyvern
Weekly Views
Server Health
Information
Explore More Servers
Servidor MCP de Automação Residencial
Controle residencial via terminal com comandos rápidos
SSL Monitor MCP Server
Track domain registrations and SSL certificates in real time
Pydantic Logfire MCP Server
Retrieve and analyze application telemetry with LLMs
Tetris MCP
Serve Tetris boards via MCP with Hono
ROS MCP Server
Bidirectional AI integration for ROS robots
MCP Server JSON Sync
Sync MCP configs from VS Code to AI assistants hourly