Skip to content

Commit e4106b9

Browse files
author
mrachidi
committed
readme fix
1 parent 79107f2 commit e4106b9

File tree

1 file changed

+71
-12
lines changed

1 file changed

+71
-12
lines changed

README.md

Lines changed: 71 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,22 +14,58 @@ A modular Model Context Protocol (MCP) server providing comprehensive security v
1414
<img src="demo.gif" alt="demo"/>
1515
</p>
1616

17-
## 🚀 Quick Deploy to Heroku
17+
## 🔗 Using the Hosted Server
18+
19+
The vulnerability intelligence MCP server is already hosted and ready to use! Simply configure your MCP client to connect to it.
20+
21+
### Claude Desktop Configuration
22+
23+
Add this configuration to your Claude Desktop settings file (`~/.config/claude/claude_desktop_config.json`):
24+
25+
```json
26+
{
27+
"mcpServers": {
28+
"vulnerability-intelligence": {
29+
"command": "npx",
30+
"args": ["-y", "@modelcontextprotocol/server-fetch"],
31+
"env": {
32+
"FETCH_URL": "https://vulnerability-intelligence-mcp-server-edb8b15494e8.herokuapp.com/sse"
33+
}
34+
}
35+
}
36+
}
37+
```
1838

19-
1. Click "Deploy to Heroku" button
39+
### Cursor IDE Configuration
2040

21-
[![Deploy to Heroku](https://www.herokucdn.com/deploy/button.svg)](https://heroku.com/deploy?template=https://github.com/kirill-markin/weaviate-mcp-server)
41+
Add this configuration to your Cursor MCP settings file (`~/.cursor/mcp.json`):
2242

23-
2. After deployment, configure Cursor:
24-
- Open Cursor Settings → Features
25-
- Add new MCP server
26-
- Use your Heroku URL with `/sse` path (e.g., `https://<your-app-name>.herokuapp.com/sse`)
43+
```json
44+
{
45+
"mcpServers": {
46+
"vulnerability-intelligence": {
47+
"url": "https://vulnerability-intelligence-mcp-server-edb8b15494e8.herokuapp.com/sse"
48+
}
49+
}
50+
}
51+
```
2752

28-
3. Test the vulnerability tools:
29-
- **CVE Lookup**: "Look up CVE-2021-44228" (Log4Shell vulnerability)
30-
- **EPSS Score**: "Get EPSS score for CVE-2021-44228"
31-
- **Package Check**: "Check the 'requests' Python package for vulnerabilities"
32-
- **Exploit Check**: "Check for exploits for CVE-2021-44228"
53+
Alternatively, in Cursor IDE:
54+
1. Open Cursor Settings → Features → MCP Servers
55+
2. Click "Add New Server"
56+
3. Select "Server-Sent Events (SSE)" as the type
57+
4. Enter URL: `https://vulnerability-intelligence-mcp-server-edb8b15494e8.herokuapp.com/sse`
58+
5. Give it a name: `vulnerability-intelligence`
59+
60+
### Test the Connection
61+
62+
Once configured, try these example queries in Claude or Cursor:
63+
64+
- **CVE Lookup**: "Look up CVE-2021-44228" (Log4Shell vulnerability)
65+
- **EPSS Score**: "Get EPSS score for CVE-2021-44228"
66+
- **Package Check**: "Check the 'requests' Python package for vulnerabilities"
67+
- **Exploit Check**: "Check for exploits for CVE-2021-44228"
68+
- **CVSS Calculator**: "Calculate CVSS score for vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
3369

3470
## 🛡️ Available Security Tools
3571

@@ -254,6 +290,29 @@ Available environment variables (can be set in `.env`):
254290
- `DEBUG` (default: false) - Enable debug mode
255291
- `MCP_USER_AGENT` - Custom User-Agent for HTTP requests
256292

293+
## 🚀 Deploy Your Own Instance
294+
295+
If you want to deploy your own instance of the vulnerability intelligence server, you can use Heroku for quick deployment:
296+
297+
### Quick Deploy to Heroku
298+
299+
1. Click "Deploy to Heroku" button
300+
301+
[![Deploy to Heroku](https://www.herokucdn.com/deploy/button.svg)](https://heroku.com/deploy?template=https://github.com/kirill-markin/weaviate-mcp-server)
302+
303+
2. After deployment, your instance will be available at:
304+
- `https://<your-app-name>.herokuapp.com/sse`
305+
306+
3. Configure your MCP client to use your deployed instance:
307+
- For Claude Desktop: Update the `FETCH_URL` in your configuration
308+
- For Cursor IDE: Update the URL in your MCP settings
309+
310+
4. Test your deployment with the same example queries:
311+
- **CVE Lookup**: "Look up CVE-2021-44228"
312+
- **EPSS Score**: "Get EPSS score for CVE-2021-44228"
313+
- **Package Check**: "Check the 'requests' Python package for vulnerabilities"
314+
- **Exploit Check**: "Check for exploits for CVE-2021-44228"
315+
257316
## 📊 Data Sources & APIs
258317

259318
- **CVE Data**: [NIST National Vulnerability Database](https://nvd.nist.gov/) (NVD API 2.0)

0 commit comments

Comments
 (0)