Federal court records and PACER case data. 4 MCP tools for legal research.
{
"mcpServers": {
"io-github-martc03-court-records": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Federal court records and PACER case data. 4 MCP tools for legal research.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 2 days ago. 3 stars.
Will it work with my client?
Transport: . Compatibility not confirmed.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
956k Swiss court decisions: full-text search, citation graph, statute lookup (DE/FR/IT)
Chilean legislation via MCP — full-text search across statutes and provisions
Luxembourg legislation via MCP — full-text search across statutes and provisions
Cameroon legislation via MCP -- full-text search across statutes and provisions
MCP Security Weekly
Get CVE alerts and security updates for io.github.martc03/court-records and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Unified vulnerability intelligence from 4 government data sources in a single MCP server. Get enriched CVE lookups with CVSS scores, active exploitation status, exploitation probability, and ATT&CK techniques in one call.
| Source | What It Provides | Update Frequency | |--------|-----------------|-----------------| | NIST NVD 2.0 | CVE details, CVSS scores, descriptions, references, CWE classifications | Continuous | | CISA KEV | Actively exploited vulnerabilities catalog, remediation deadlines | Daily | | FIRST.org EPSS | Exploitation probability scores (0-1) predicting likelihood of exploitation in next 30 days | Daily | | MITRE ATT&CK | Adversary techniques mapped to CVEs | Quarterly |
vuln_lookup_cve — Enriched CVE LookupThe killer feature. Look up any CVE and get intelligence from all 4 sources in a single call.
{ cveId: "CVE-2021-44228" }vuln_search — Search CVEsSearch the NVD by keyword, severity, and date range. Optionally filter to only actively exploited (KEV) vulnerabilities.
{ keyword: "apache log4j", severity: "CRITICAL", hasKev: true, limit: 20 }vuln_kev_latest — Recently Exploited VulnerabilitiesGet vulnerabilities recently added to CISA's Known Exploited Vulnerabilities catalog.
{ days: 7, limit: 20 }vuln_kev_due_soon — Upcoming Remediation DeadlinesGet KEV entries with remediation deadlines approaching. Critical for federal compliance.
{ days: 14, limit: 20 }vuln_epss_top — Highest Exploitation ProbabilityGet CVEs most likely to be exploited in the next 30 days based on EPSS machine learning model.
{ threshold: 0.7, limit: 20 }vuln_trending — Newly Published Critical CVEsGet recently published high/critical severity CVEs from the NVD.
{ days: 3, severity: "CRITICAL", limit: 20 }vuln_by_vendor — Vendor Vulnerability AssessmentSearch CVEs for a specific vendor/product. Cross-references with CISA KEV to flag actively exploited issues.
{ vendor: "microsoft", product: "windows", limit: 20 }Install from Glama.ai.
{
"mcpServers": {
"cybersecurity": {
"url": "https://cybersecurity-vuln-mcp.apify.actor/mcp"
}
}
}
{
"mcpServers": {
"cybersecurity": {
"command": "node",
"args": ["path/to/servers/cybersecurity-vuln-mcp/dist/stdio.js"],
"env": {
"NVD_API_KEY": "your-key-here"
}
}
}
}
git clone https://github.com/martc03/gov-mcp-servers.git
cd gov-mcp-servers/servers/cybersecurity-vuln-mcp
npm install && npm run build
node dist/stdio.js
| Variable | Required | Description |
|----------|----------|-------------|
| NVD_API_KEY | No | NVD API key for higher rate limits (50 req/30s vs 5 req/30s). Register here. |
| Data Source | TTL | Notes | |-------------|-----|-------| | NVD CVE lookups | 1 hour | Per-CVE | | CISA KEV catalog | 2 hours | Full catalog | | EPSS scores | 24 hours | Per-CVE | | ATT&CK mappings | Static