- Explore MCP Servers
- mcp_nuclei_server
Mcp Nuclei Server
What is Mcp Nuclei Server
mcp_nuclei_server is a Nuclei security scanning server based on the Model Control Protocol (MCP). It provides convenient vulnerability scanning services, allowing large language models to execute Nuclei security scans with various options and output formats.
Use cases
Use cases include automated security assessments for web applications, integration into CI/CD pipelines for continuous security testing, and providing security scanning services for organizations looking to identify vulnerabilities in their systems.
How to use
To use mcp_nuclei_server, clone the repository, install the necessary dependencies, and configure the MCP settings. After setup, you can run the server and perform vulnerability scans using the Nuclei tool.
Key features
Key features include support for Nuclei security scanning, configurable template and tag filtering, severity-based vulnerability filtering, JSON format output results, and easy integration with MCP services.
Where to use
mcp_nuclei_server can be used in cybersecurity, vulnerability assessment, and penetration testing environments, where automated scanning of web applications and services is required.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Overview
What is Mcp Nuclei Server
mcp_nuclei_server is a Nuclei security scanning server based on the Model Control Protocol (MCP). It provides convenient vulnerability scanning services, allowing large language models to execute Nuclei security scans with various options and output formats.
Use cases
Use cases include automated security assessments for web applications, integration into CI/CD pipelines for continuous security testing, and providing security scanning services for organizations looking to identify vulnerabilities in their systems.
How to use
To use mcp_nuclei_server, clone the repository, install the necessary dependencies, and configure the MCP settings. After setup, you can run the server and perform vulnerability scans using the Nuclei tool.
Key features
Key features include support for Nuclei security scanning, configurable template and tag filtering, severity-based vulnerability filtering, JSON format output results, and easy integration with MCP services.
Where to use
mcp_nuclei_server can be used in cybersecurity, vulnerability assessment, and penetration testing environments, where automated scanning of web applications and services is required.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Content
MCP Nuclei Server
A Nuclei security scanning server based on MCP (Model Control Protocol), providing convenient vulnerability scanning services.
Project Introduction
MCP Nuclei Server is a Nuclei security scanning service developed based on the MCP protocol. It allows large language models to execute Nuclei security scans, supporting various scanning options and result output formats.
Key Features:
- Support for Nuclei security scanning
- Configurable template and tag filtering
- Support for severity-based vulnerability filtering
- JSON format output results
- Easy-to-integrate MCP service
Installation Guide
Prerequisites
- Python 3.8 or higher
- Nuclei binary (installed and configured)
Installation Steps
- Clone the repository:
git clone https://github.com/crazyMarky/mcp_nuclei_server.git
cd mcp_nuclei_server
- Install UV and activate environment:
curl -LsSf https://astral.sh/uv/install.sh | sh # Linux/Mac
powershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex" # Windows
- Install dependencies:
# Create and activate virtual environment
uv venv
source .venv/bin/activate
# Install mcp related packages
uv pip install mcp
Usage Guide
MCP Configuration (Example for CLINE)
- Reference MCP JSON configuration:
Usage Example

Parameter Description
target: Target URL or IP addresstemplates: List of specific templates to use (optional)severity: Vulnerability severity filter (critical, high, medium, low, info)template_tags: Template tag filter (optional)output_format: Output format (default: “json”)
Output Format
Scan results are returned in JSON format with the following fields:
{
"success": true,
"target": "https://example.com",
"time_cost_seconds": 10.5,
"results": [
{
"template": "template-name",
"severity": "high",
"matched_at": "https://example.com/path",
"info": {
"name": "Vulnerability Name",
"description": "Vulnerability Description"
}
}
]
}
Contributing
Issues and Pull Requests are welcome!
- Fork the project
- Create your feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
License
This project is licensed under the MIT License - see the LICENSE file for details
Contact
For any questions or suggestions, please contact us through:
- Submit an Issue
Dev Tools Supporting MCP
The following are the main code editors that support the Model Context Protocol. Click the link to visit the official website for more information.










