{
"mcpServers": {
"nessus": {
"env": {
"NESSUS_URL": "https://your-nessus-instance:8834",
"NESSUS_ACCESS_KEY": "your-access-key",
"NESSUS_SECRET_KEY": "your-secret-key"
},
"args": [
"/path/to/nessus-mcp-server/build/index.js"
],
"command": "node"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
MIT. View license →
Is it maintained?
Last commit 348 days ago. 12 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for Nessus Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A Model Context Protocol (MCP) server for interacting with the Tenable Nessus vulnerability scanner. This server allows AI assistants to perform vulnerability scanning and analysis through the MCP protocol.
The server provides the following tools:
| Tool Name | Description |
| --------------------------- | ------------------------------------------------------- |
| list_scan_templates | List available Nessus scan templates |
| start_scan | Start a new vulnerability scan against a target |
| get_scan_status | Check the status of a running scan |
| get_scan_results | Get the results of a completed scan |
| list_scans | List all scans and their status |
| get_vulnerability_details | Get detailed information about a specific vulnerability |
| search_vulnerabilities | Search for vulnerabilities by keyword |
Clone the repository:
git clone https://github.com/Cyreslab-AI/nessus-mcp-server.git
cd nessus-mcp-server
Install dependencies:
npm install
Build the server:
npm run build
By default, the server runs in mock mode, which doesn't require a Nessus API key:
node build/index.js
To connect to a real Nessus instance, set the following environment variables:
NESSUS_URL=https://your-nessus-instance:8834
NESSUS_ACCESS_KEY=your-access-key
NESSUS_SECRET_KEY=your-secret-key
Then run the server:
node build/index.js
To use this server with Claude for Desktop:
Edit your Claude for Desktop configuration file:
~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonAdd the server configuration:
{
"mcpServers": {
"nessus": {
"command": "node",
"args": ["/path/to/nessus-mcp-server/build/index.js"],
"env": {
"NESSUS_URL": "https://your-nessus-instance:8834",
"NESSUS_ACCESS_KEY": "your-access-key",
"NESSUS_SECRET_KEY": "your-secret-key"
}
}
}
}
For mock mode, you can omit the env section.
start_scan:
target: 192.168.1.1
scan_type: basic-network-scan
get_scan_results:
scan_id: scan-1234567890
search_vulnerabilities:
keyword: log4j
src/index.ts: Main server entry pointsrc/nessus-api.ts: Nessus API client with mock fallbacksrc/mock-data.ts: Mock vulnerability data for testingsrc/tools/: Tool implementationssrc/utils/: Utility functionssrc/tools/src/index.tsMIT
This server is not affiliated with or endorsed by Tenable. Nessus is a trademark of Tenable, Inc.