Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"io-github-tb0hdan-wass-mcp": {
"args": [
"shcheck"
],
"command": "uvx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
A Model Context Protocol (MCP) server for web application security scanning.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
uvx 'shcheck' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
Checked shcheck against OSV.dev.
Click any tool to inspect its schema.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
An evil MCP server used for redteam testing
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
IAM Policy Autopilot is an open source static code analysis tool that helps you quickly create baseline AWS IAM policies that you can refine as your application evolves. This tool is available as a command-line utility and MCP server for use within AI coding assistants for quickly building IAM policies.
Signed receipts for agent, API, and MCP interactions. Portable and offline-verifiable.
MCP Security Weekly
Get CVE alerts and security updates for MCP server for web application security scanning and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A Model Context Protocol (MCP) server for web application security scanning.
docker run -p 127.0.0.1:8989:8989 tb0hdan/wass-mcp
Example command to add WASS-MCP server to Claude MCP clients:
claude mcp add wass-mcp --transport http http://127.0.0.1:8989
or Gemini:
gemini mcp add wass-mcp --transport http http://127.0.0.1:8989
Perform web server vulnerability scans using Nikto.
Parameters:
| Name | Type | Required | Description |
|---|---|---|---|
host | string | Yes | Target hostname or IP address |
port | integer | No | Target port (default: 80) |
vhost | string | No | Virtual host header |
max_lines | integer | No | Maximum output lines |
offset | integer | No | Output line offset |
Example:
{
"host": "192.168.1.100",
"port": 443
}
Perform template-based vulnerability scanning using Nuclei.
Parameters:
| Name | Type | Required | Description |
|---|---|---|---|
host | string | Yes | Target hostname or IP address |
port | integer | No | Target port (default: 80) |
vhost | string | No | Virtual host header |
max_lines | integer | No | Maximum output lines |
offset | integer | No | Output line offset |
Vulnerabilities Detected:
Example:
{
"host": "192.168.1.100",
"port": 443
}
Perform comprehensive web application vulnerability scans using Wapiti.
Parameters:
| Name | Type | Required | Description |
|---|---|---|---|
host | string | Yes | Target hostname or IP address |
port | integer | No | Target port (default: 80) |
vhost | string | No | Virtual host header |
max_lines | integer | No | Maximum output lines |
offset | integer | No | Output line offset |
Vulnerabilities Detected:
Example:
{
"host": "192.168.1.100",
"port": 8080
}
Analyze HTTP security headers using shcheck.py.
Parameters:
| Name | Type | Required | Description |
|---|---|---|---|
host | string | Yes | Target hostname or IP address |
port | integer | No | Target port (default: 80) |
vhost | string | No | Virtual host header |
max_lines | integer | No | Maximum output lines |
offset | integer | No | Output line offset |
Headers Analyzed:
Example:
{
"host": "example.com",
"port": 443
}
Perform a comprehensive security scan using all available scanners in parallel.
Parameters:
| Name | Type | Required | Description |
|---|---|---|---|
host | string | Yes | Target hostname or IP address |
port | integer | No |