sec-mcp: Security Checking Toolkit

sec-mcp: Security Checking Toolkit

By Montimage GitHub

A Python toolkit providing security checks for domains, URLs, IPs, and more. Integrate easily into any Python application, use via terminal CLI, or run as an MCP server to enrich LLM context with real-time threat insights.

security-tools mcp-server
Overview

What is sec-mcp?

sec-mcp is a Python toolkit designed for performing security checks on domains, URLs, IPs, and more. It can be easily integrated into any Python application, used via terminal CLI, or run as an MCP server to provide real-time threat insights for LLM workflows.

How to use sec-mcp?

To use sec-mcp, you can install it via pip, set up a virtual environment, and run commands through the CLI or integrate it into your Python applications using its API. For MCP server usage, configure your LLM client to connect to the sec-mcp server.

Key features of sec-mcp?

  • Comprehensive security checks against multiple blacklist feeds.
  • On-demand updates from various sources like OpenPhish and URLhaus.
  • High-performance, thread-safe SQLite storage with in-memory caching.
  • Intuitive CLI for interactive single or batch scans.
  • Built-in support for LLM/AI integrations over JSON/STDIO.

Use cases of sec-mcp?

  1. Checking the safety of URLs before accessing them.
  2. Integrating security checks into AI-driven applications.
  3. Performing bulk checks on multiple domains or IPs for security audits.

FAQ from sec-mcp?

  • Can sec-mcp check all types of URLs and domains?

Yes! sec-mcp can check domains, URLs, and IP addresses against various blacklists.

  • Is sec-mcp free to use?

Yes! sec-mcp is open-source and free to use under the MIT license.

  • How can I update the blacklist in sec-mcp?

You can update the blacklist by running the command sec-mcp update in the terminal.

Overview

What is sec-mcp?

sec-mcp is a Python toolkit designed for performing security checks on domains, URLs, IPs, and more. It can be easily integrated into any Python application, used via terminal CLI, or run as an MCP server to provide real-time threat insights for LLM workflows.

How to use sec-mcp?

To use sec-mcp, you can install it via pip, set up a virtual environment, and run commands through the CLI or integrate it into your Python applications using its API. For MCP server usage, configure your LLM client to connect to the sec-mcp server.

Key features of sec-mcp?

  • Comprehensive security checks against multiple blacklist feeds.
  • On-demand updates from various sources like OpenPhish and URLhaus.
  • High-performance, thread-safe SQLite storage with in-memory caching.
  • Intuitive CLI for interactive single or batch scans.
  • Built-in support for LLM/AI integrations over JSON/STDIO.

Use cases of sec-mcp?

  1. Checking the safety of URLs before accessing them.
  2. Integrating security checks into AI-driven applications.
  3. Performing bulk checks on multiple domains or IPs for security audits.

FAQ from sec-mcp?

  • Can sec-mcp check all types of URLs and domains?

Yes! sec-mcp can check domains, URLs, and IP addresses against various blacklists.

  • Is sec-mcp free to use?

Yes! sec-mcp is open-source and free to use under the MIT license.

  • How can I update the blacklist in sec-mcp?

You can update the blacklist by running the command sec-mcp update in the terminal.

No tools information available.

Mirror of

image-generation mcp-server
View Details

Secure MCP server for analyzing Excel files with oletools

oletools mcp-server
View Details

Mirror of

bigquery mcp-server
View Details

MCPHubs is a website that showcases projects related to Anthropic's Model Context Protocol (MCP)

mcp mcp-server
View Details
Dealx
Dealx by DealExpress

-

dealx mcp-server
View Details

Google Analytics MCP server for accessing analytics data through tools and resources

google-analytics mcp-server
View Details

A Python-based MCP server that lets Claude run boto3 code to query and manage AWS resources. Execute powerful AWS operations directly through Claude with proper sandboxing and containerization. No need for complex setups - just pass your AWS credentials and start interacting with all AWS services.

aws mcp-server
View Details