Grants.gov search and USAspending grant data. 4 MCP tools for grant discovery.
{
"mcpServers": {
"io-github-martc03-grant-finder": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Grants.gov search and USAspending grant data. 4 MCP tools for grant discovery.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Commit history unknown.
Will it work with my client?
Transport: . Compatibility not confirmed.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for io.github.martc03/grant-finder and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Unified vulnerability intelligence from 4 government data sources in a single MCP server. Get enriched CVE lookups with CVSS scores, active exploitation status, exploitation probability, and ATT&CK techniques in one call.
| Source | What It Provides | Update Frequency | |--------|-----------------|-----------------| | NIST NVD 2.0 | CVE details, CVSS scores, descriptions, references, CWE classifications | Continuous | | CISA KEV | Actively exploited vulnerabilities catalog, remediation deadlines | Daily | | FIRST.org EPSS | Exploitation probability scores (0-1) predicting likelihood of exploitation in next 30 days | Daily | | MITRE ATT&CK | Adversary techniques mapped to CVEs | Quarterly |
vuln_lookup_cve — Enriched CVE LookupThe killer feature. Look up any CVE and get intelligence from all 4 sources in a single call.
{ cveId: "CVE-2021-44228" }vuln_search — Search CVEsSearch the NVD by keyword, severity, and date range. Optionally filter to only actively exploited (KEV) vulnerabilities.
{ keyword: "apache log4j", severity: "CRITICAL", hasKev: true, limit: 20 }vuln_kev_latest — Recently Exploited VulnerabilitiesGet vulnerabilities recently added to CISA's Known Exploited Vulnerabilities catalog.
{ days: 7, limit: 20 }vuln_kev_due_soon — Upcoming Remediation DeadlinesGet KEV entries with remediation deadlines approaching. Critical for federal compliance.
{ days: 14, limit: 20 }vuln_epss_top — Highest Exploitation ProbabilityGet CVEs most likely to be exploited in the next 30 days based on EPSS machine learning model.
{ threshold: 0.7, limit: 20 }vuln_trending — Newly Published Critical CVEsGet recently published high/critical severity CVEs from the NVD.
{ days: 3, severity: "CRITICAL", limit: 20 }vuln_by_vendor — Vendor Vulnerability AssessmentSearch CVEs for a specific vendor/product. Cross-references with CISA KEV to flag actively exploited issues.
{ vendor: "microsoft", product: "windows", limit: 20 }Install from Glama.ai.
{
"mcpServers": {
"cybersecurity": {
"url": "https://cybersecurity-vuln-mcp.apify.actor/mcp"
}
}
}
{
"mcpServers": {
"cybersecurity": {
"command": "node",
"args": ["path/to/servers/cybersecurity-vuln-mcp/dist/stdio.js"],
"env": {
"NVD_API_KEY": "your-key-here"
}
}
}
}
git clone https://github.com/martc03/gov-mcp-servers.git
cd gov-mcp-servers/servers/cybersecurity-vuln-mcp
npm install && npm run build
node dist/stdio.js
| Variable | Required | Description |
|----------|----------|-------------|
| NVD_API_KEY | No | NVD API key for higher rate limits (50 req/30s vs 5 req/30s). Register here. |
| Data Source | TTL | Notes | |-------------|-----|-------| | NVD CVE lookups | 1 hour | Per-CVE | | CISA KEV catalog | 2 hours | Full catalog | | EPSS scores | 24 hours | Per-CVE | | ATT&CK mappings | Static