Linux CVE prioritisation: 16 MCP tools for scan, fleet, runtime, and PR-able fix discovery.
{
"mcpServers": {
"io-github-cope-labs-selvo": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Linux CVE prioritisation: 16 MCP tools for scan, fleet, runtime, and PR-able fix discovery.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Commit history unknown.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Know what's actually dangerous on your Linux servers.
selvo scans your installed packages, checks every CVE against 8 data sources, filters out what your distro already patched, and ranks the rest by blast radius and exploit probability. Not just a list --- a prioritized action plan.
Live at selvo.dev | Public Report | GitHub Action
curl -s https://selvo.dev/install.sh | SELVO_API_KEY=sk_xxx bash
Collects your real installed packages, sends to the API for analysis, sets up daily monitoring via cron. Supports dpkg, rpm, pacman, apk.
Get a free API key at selvo.dev.
- uses: Cope-Labs/selvo-action@v1
with:
api-key: ${{ secrets.SELVO_API_KEY }}
Auto-detects runner packages. Posts results as a PR comment. Fails on CISA KEV or weaponized exploits.
# Scan your actual packages
dpkg-query -W -f='${db:Status-Abbrev} ${Package} ${Version}\n' > packages.txt
curl -X POST https://selvo.dev/api/v1/scan/packages \
-H "X-API-Key: $SELVO_API_KEY" \
-H "Content-Type: application/json" \
-d "{\"packages\": \"$(cat packages.txt)\", \"ecosystem\": \"debian\"}"
curl -X POST https://selvo.dev/api/v1/scan/image \
-H "X-API-Key: $SELVO_API_KEY" \
-H "Content-Type: application/json" \
-d '{"image": "nginx:1.24"}'
# Already running Grype or Trivy? Send the JSON for prioritized results:
curl -X POST https://selvo.dev/api/v1/scan \
-H "X-API-Key: $SELVO_API_KEY" \
-d "{\"grype\": \"$(cat grype-results.json)\"}"
Distro-aware CVE filtering. If Debian backported a fix into zlib 1.2.11, we don't flag it. We cross-reference the Debian Security Tracker to remove CVEs your distro already patched. Other scanners miss this and massively over-report.
Blast radius scoring. A CVE in a library that 200 packages depend on ranks higher than one in a leaf package. We build real dependency graphs from Debian Packages.gz, Alpine APKINDEX, and Arch repo DBs.
Exploit intelligence. CISA KEV status, public exploit availability, EPSS exploitation probability --- not just CVSS severity.
Your actual packages. We scan what's really installed on your system, not a generic reference list. The dashboard shows "Your system" vs "Reference scan" so you know exactly what you're looking at.
| Signal | Weight | Source |
|---|---|---|
| Dependency blast radius | 22% | Transitive reverse deps from package index |
| EPSS exploit probability | 20% | FIRST.org |
| Chokepoint centrality | 15% | Betweenness centrality via NetworkX |
| Version lag | 14% | Repology upstream vs installed |
| CVSS severity | 10% | NVD |
| Exploit maturity | 8% | CISA KEV + PoC/weaponized detection |
| Ecosystem popularity | 7% | Repology repo count |
| Download count | 2% | popcon / Homebrew |
| Days exposed | 2% | CVE disclosure date age |
Packages with no securi
No automated test available for this server. Check the GitHub README for setup instructions.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationNo known vulnerabilities.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Hash-verified file editing MCP server with token efficiency hook. 11 tools for AI coding agents.
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for io.github.Cope-Labs/selvo and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.