This project is a Model Context Protocol (MCP) server implementation built with Quarkus that provides security vulnerability information and best practices for Java development.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"mcp-server-test-quarkus": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
This project is a Model Context Protocol (MCP) server implementation built with Quarkus that provides security vulnerability information and best practices for Java development.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in ai-ml
Dynamic problem-solving through sequential thought chains
A Model Context Protocol (MCP) server and CLI that provides tools for agent use when working on iOS and macOS projects.
An open-source AI agent that brings the power of Gemini directly into your terminal.
The Apify MCP server enables your AI agents to extract data from social media, search engines, maps, e-commerce sites, or any other website using thousands of ready-made scrapers, crawlers, and automation tools available on the Apify Store.
MCP Security Weekly
Get CVE alerts and security updates for Mcp Server Test Quarkus and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
This project is a Model Context Protocol (MCP) server implementation built with Quarkus that provides security vulnerability information and best practices for Java development. It demonstrates how to create a practical, domain-specific MCP server that can extend AI assistants like IBM Bob with actionable security intelligence.
Instead of returning simple data, this server provides real-world value by helping developers:
📖 Want to understand more about MCP endpoint? See the MCP Endpoint Explanation for a detailed breakdown of the URL structure and transport mechanism.
The MCP server exposes the following security-focused tools:
listVulnerabilitiesGet a complete list of all detectable Java security vulnerabilities.
Parameters: None
Returns: List of vulnerabilities with:
Example usage in Bob:
"List all Java security vulnerabilities"
"What vulnerabilities can you detect?"
getVulnerabilityDetailsGet comprehensive information about a specific vulnerability including remediation steps.
Parameters:
vulnerabilityId (required): The vulnerability ID (e.g., "SQL_INJECTION", "HARDCODED_CREDENTIALS")Returns: Detailed information including:
Example usage in Bob:
"Get details about SQL_INJECTION vulnerability"
"Tell me about HARDCODED_CREDENTIALS security issue"
"How do I fix XSS_VULNERABILITY?"
getOwaspTop10Get information about the OWASP Top 10 - 2021 security risks.
Parameters: None
Returns: Complete OWASP Top 10 list with:
Example usage in Bob:
"Show me the OWASP Top 10"
"What are the top security risks according to OWASP?"
searchBySeverityFind vulnerabilities filtered by severity level.
Parameters:
severity (required): CRITICAL, HIGH, MEDIUM, or LOWReturns: Filtered list of vulnerabilities matching the severity level with descriptions.
Example usage in Bob:
"Show me all CRITICAL severity vulnerabilities"
"Find HIGH severity security issues"
"What are the MEDIUM severity risks?"
getSecurityBestPracticesGet comprehensive security best practices for Java development.
Parameters: None
Returns: Detailed guidelines covering:
Example usage in Bob:
"What are Java security best practices?"
"Give me security recommendations for Java"
"How should I secure my Java application?"
The server includes information about these critical vulnerabilities:
| Vulnerability | Severity | OWASP Category | CWE |
|---|---|---|---|
| SQL Injection | CRITICAL | A03:2021 - Injection | CWE-89 |
| Hardcoded Credentials | CRITICAL | A07:2021 - Authentication Failures | CWE-798 |
| Path Traversal | HIGH | A01:2021 - Broken Access Control | CWE-22 |
| Weak Cryptography | HIGH | A02:2021 - Cryptographic Failures | CWE-327 |
| Cross-Site Scripting (XSS) | HIGH | A03:2021 - Injection | CWE-79 |
Each vulnerability includes: