You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[](https://heroku.com/deploy?template=https://github.com/kirill-markin/weaviate-mcp-server)
41
+
Add this configuration to your Cursor MCP settings file (`~/.cursor/mcp.json`):
22
42
23
-
2. After deployment, configure Cursor:
24
-
- Open Cursor Settings → Features
25
-
- Add new MCP server
26
-
- Use your Heroku URL with `/sse` path (e.g., `https://<your-app-name>.herokuapp.com/sse`)
-**CVE Lookup**: "Look up CVE-2021-44228" (Log4Shell vulnerability)
30
-
-**EPSS Score**: "Get EPSS score for CVE-2021-44228"
31
-
-**Package Check**: "Check the 'requests' Python package for vulnerabilities"
32
-
-**Exploit Check**: "Check for exploits for CVE-2021-44228"
53
+
Alternatively, in Cursor IDE:
54
+
1. Open Cursor Settings → Features → MCP Servers
55
+
2. Click "Add New Server"
56
+
3. Select "Server-Sent Events (SSE)" as the type
57
+
4. Enter URL: `https://vulnerability-intelligence-mcp-server-edb8b15494e8.herokuapp.com/sse`
58
+
5. Give it a name: `vulnerability-intelligence`
59
+
60
+
### Test the Connection
61
+
62
+
Once configured, try these example queries in Claude or Cursor:
63
+
64
+
-**CVE Lookup**: "Look up CVE-2021-44228" (Log4Shell vulnerability)
65
+
-**EPSS Score**: "Get EPSS score for CVE-2021-44228"
66
+
-**Package Check**: "Check the 'requests' Python package for vulnerabilities"
67
+
-**Exploit Check**: "Check for exploits for CVE-2021-44228"
68
+
-**CVSS Calculator**: "Calculate CVSS score for vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
33
69
34
70
## 🛡️ Available Security Tools
35
71
@@ -254,6 +290,29 @@ Available environment variables (can be set in `.env`):
254
290
-`DEBUG` (default: false) - Enable debug mode
255
291
-`MCP_USER_AGENT` - Custom User-Agent for HTTP requests
256
292
293
+
## 🚀 Deploy Your Own Instance
294
+
295
+
If you want to deploy your own instance of the vulnerability intelligence server, you can use Heroku for quick deployment:
296
+
297
+
### Quick Deploy to Heroku
298
+
299
+
1. Click "Deploy to Heroku" button
300
+
301
+
[](https://heroku.com/deploy?template=https://github.com/kirill-markin/weaviate-mcp-server)
302
+
303
+
2. After deployment, your instance will be available at:
304
+
-`https://<your-app-name>.herokuapp.com/sse`
305
+
306
+
3. Configure your MCP client to use your deployed instance:
307
+
- For Claude Desktop: Update the `FETCH_URL` in your configuration
308
+
- For Cursor IDE: Update the URL in your MCP settings
309
+
310
+
4. Test your deployment with the same example queries:
311
+
-**CVE Lookup**: "Look up CVE-2021-44228"
312
+
-**EPSS Score**: "Get EPSS score for CVE-2021-44228"
313
+
-**Package Check**: "Check the 'requests' Python package for vulnerabilities"
314
+
-**Exploit Check**: "Check for exploits for CVE-2021-44228"
315
+
257
316
## 📊 Data Sources & APIs
258
317
259
318
-**CVE Data**: [NIST National Vulnerability Database](https://nvd.nist.gov/) (NVD API 2.0)
0 commit comments