MCPSERV.CLUB
EdenYavin

OSV MCP Server

MCP Server

Fast OSV vulnerability queries via MCP

Stale(50)
2stars
3views
Updated Apr 23, 2025

About

A lightweight Model Context Protocol server that exposes the OSV database API, enabling quick queries for CVE IDs, affected versions, fix releases, and supported ecosystems across programming languages.

Capabilities

Resources
Access data sources
Tools
Execute functions
Prompts
Pre-built templates
Sampling
AI model interactions

Overview

The OSV MCP Server bridges the gap between AI assistants and the Open Source Vulnerability (OSV) database, offering a lightweight, ready‑to‑run service that exposes vulnerability data as first‑class tools. For developers building AI‑powered security workflows, this server eliminates the need to manage complex database queries or API keys; instead, a Claude or Cursor assistant can simply invoke a tool to fetch CVE IDs, affected package versions, or fix releases. This streamlines vulnerability assessment, dependency scanning, and continuous compliance checks directly within conversational agents.

At its core, the server provides four intuitive tools. returns all CVE identifiers linked to a specified package, optionally narrowing the search by version or ecosystem. lists every package version that is vulnerable for a given CVE, while identifies the releases that resolve the issue. Finally, exposes the ecosystems currently supported by the server (e.g., PyPI, npm, Maven), enabling dynamic discovery of package scopes. These capabilities are expressed in plain JSON, allowing AI assistants to parse results effortlessly and incorporate them into downstream logic or user prompts.

The server’s lightweight implementation—built on Python 3.11 and deployable via the Smithery CLI or a local command—means it can run on any machine that hosts an MCP client. Once registered, the tools become available to the assistant without additional authentication layers; the server acts as a trusted data source that the assistant can call on demand. This design is especially valuable for security teams that want to embed real‑time vulnerability data into chatbots, automated remediation scripts, or continuous integration pipelines.

Typical use cases include:

  • Real‑time dependency checks – An assistant can ask “What CVEs affect ?” and immediately receive a list of identifiers, which can then be cross‑referenced against internal policy.
  • Fix version recommendation – After identifying a vulnerability, the assistant can propose the minimal upgrade needed by querying .
  • Ecosystem inventory – By calling , a developer can discover which package managers are supported, aiding multi‑language project planning.
  • Compliance reporting – Automated agents can generate audit reports that include the latest OSV data, ensuring up‑to‑date vulnerability coverage.

What sets this MCP server apart is its zero‑configuration approach to data access. Developers can focus on crafting AI interactions rather than plumbing database connections, and the server’s declarative tool definitions make it straightforward to extend or modify functionality. As AI assistants become more integral to software delivery, having a dedicated, high‑performance vulnerability data source like the OSV MCP Server empowers teams to embed security intelligence directly into conversational workflows, improving speed, accuracy, and overall software resilience.