- Explore MCP Servers
- upguard-cyberrisk-mcp-server-nodejs
Upguard Cyberrisk Mcp Server Nodejs
What is Upguard Cyberrisk Mcp Server Nodejs
upguard-cyberrisk-mcp-server-nodejs is a production-ready Model Context Protocol (MCP) server designed for integrating with the UpGuard CyberRisk API. It offers comprehensive tools for cybersecurity risk assessment and management, utilizing stateless HTTP transport and resilience patterns.
Use cases
Use cases include monitoring vendor security scores, tracking data breaches, managing domains and IPs, generating security reports, and handling security notifications for organizations.
How to use
To use upguard-cyberrisk-mcp-server-nodejs, set up the server environment, configure the necessary API keys, and utilize the provided endpoints for risk management, vendor monitoring, and other features. Detailed documentation is available through the auto-generated OpenAPI 3.0 specs.
Key features
Key features include risk management, vendor monitoring, domain and IP management, breach monitoring, report generation, webhook management, organization management, notification systems, vulnerability tracking, and bulk operations.
Where to use
upguard-cyberrisk-mcp-server-nodejs can be used in various sectors that require cybersecurity risk management, including finance, healthcare, technology, and any organization that needs to monitor and manage vendor and domain security.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Overview
What is Upguard Cyberrisk Mcp Server Nodejs
upguard-cyberrisk-mcp-server-nodejs is a production-ready Model Context Protocol (MCP) server designed for integrating with the UpGuard CyberRisk API. It offers comprehensive tools for cybersecurity risk assessment and management, utilizing stateless HTTP transport and resilience patterns.
Use cases
Use cases include monitoring vendor security scores, tracking data breaches, managing domains and IPs, generating security reports, and handling security notifications for organizations.
How to use
To use upguard-cyberrisk-mcp-server-nodejs, set up the server environment, configure the necessary API keys, and utilize the provided endpoints for risk management, vendor monitoring, and other features. Detailed documentation is available through the auto-generated OpenAPI 3.0 specs.
Key features
Key features include risk management, vendor monitoring, domain and IP management, breach monitoring, report generation, webhook management, organization management, notification systems, vulnerability tracking, and bulk operations.
Where to use
upguard-cyberrisk-mcp-server-nodejs can be used in various sectors that require cybersecurity risk management, including finance, healthcare, technology, and any organization that needs to monitor and manage vendor and domain security.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Content
UpGuard CyberRisk MCP Server
A Model Context Protocol (MCP) server for integrating with UpGuard’s CyberRisk API. This server provides comprehensive security risk assessment and management capabilities through a standardized interface.
Features
- 67 API Tools across 13 categories for comprehensive security management
- 14 Enhanced Prompts including 8 advanced workflow prompts for complex operations
- Real-time Risk Assessment with vendor monitoring and breach detection
- Automated Documentation Generation with multiple output formats
- Interactive API Explorer with Swagger UI and Redoc interfaces
- Comprehensive Schema Validation with 22 Zod schema definitions
- CI/CD Integration with automated documentation deployment
Enhanced Prompts (New in v1.3.0)
The server now includes 14 comprehensive prompts (6 original + 8 enhanced) that provide guided workflows for complex security operations:
🔴 Risk Management Prompts
upguard_comprehensive_risk_assessment
- Complete risk assessment workflowsupguard_risk_trend_analysis
- Multi-period risk trend analysis
📊 Compliance & Reporting
upguard_compliance_reporting_suite
- Automated compliance report generation
🌐 Asset Management
upguard_domain_lifecycle_management
- Complete domain lifecycle workflowsupguard_bulk_asset_management
- Large-scale asset management operationsupguard_network_security_assessment
- Comprehensive network security analysis
🪝 Operations & Monitoring
upguard_setup_comprehensive_alerting
- Complete alerting infrastructure setupupguard_security_dashboard_setup
- Role-based security dashboard configuration
Benefits:
- Step-by-step guidance for complex security workflows
- Multi-tool orchestration combining multiple API endpoints
- Role-based workflows for different stakeholders (CISO, analysts, compliance)
- Best practices integration with built-in security recommendations
📖 See ENHANCED_PROMPTS.md for detailed documentation and examples.
Quick Start
Prerequisites
- Node.js 18+
- npm or yarn
- UpGuard CyberRisk API credentials
Installation
git clone https://github.com/leroylim/upguard-cyberrisk-mcp-server-nodejs.git
cd upguard-cyberrisk-mcp-server-nodejs
npm install
Configuration
Create a .env
file with your UpGuard credentials:
UPGUARD_API_KEY=your_api_key_here UPGUARD_SECRET_TOKEN=your_secret_token_here
Running the Server
npm start
MCP Configuration
To use this server with Claude Desktop or other MCP-compatible clients, you need to add it to your MCP configuration file.
For Claude Desktop (Windows/Mac/Linux)
Add the following configuration to your claude_desktop_config.json
file:
Windows: %APPDATA%\Claude\claude_desktop_config.json
Mac: ~/Library/Application Support/Claude/claude_desktop_config.json
Linux: ~/.config/Claude/claude_desktop_config.json
{
"mcpServers": {
"upguard-mcp": {
"command": "node",
"args": [
"/path/to/your/upguard-cyberrisk-mcp-server/src/index.js"
],
"env": {
"UPGUARD_API_KEY": "your_upguard_api_key_here"
}
}
}
}
For Cursor IDE
Add the following configuration to your mcp.json
file in your Cursor settings directory:
Windows: %APPDATA%\Cursor\User\mcp.json
Mac: ~/Library/Application Support/Cursor/User/mcp.json
Linux: ~/.config/Cursor/User/mcp.json
{
"mcpServers": {
"upguard-mcp": {
"command": "node",
"args": [
"/path/to/your/upguard-cyberrisk-mcp-server/src/index.js"
],
"env": {
"UPGUARD_API_KEY": "your_upguard_api_key_here"
}
}
}
}
Configuration Notes
- Replace the path: Update
/path/to/your/upguard-cyberrisk-mcp-server/src/index.js
with the actual path to your installation - Replace the API key: Update
your_upguard_api_key_here
with your actual UpGuard API key - Server name: You can change
upguard-mcp
to any name you prefer - Additional environment variables: If you’re using
UPGUARD_SECRET_TOKEN
, add it to theenv
section as well
Getting Your UpGuard API Key
Prerequisites:
- An UpGuard account with administrator access (only administrators can access API tokens)
- Access to the UpGuard platform at cyber-risk.upguard.com
Step-by-step instructions:
- Log in to your UpGuard account at https://cyber-risk.upguard.com
- Click the Settings icon in UpGuard’s top-right corner
- Navigate to the API tab in the settings menu
- Create or manage API keys:
- Any existing API keys will be listed here
- Click “Create new API key” to generate a new key
- You can also delete existing keys from this tab if needed
- Copy your API key - it will be an alphanumeric string
- Paste the key into your MCP configuration file
Testing your API key (optional):
You can verify your API key works by testing it with curl:
curl -H "Authorization: YOUR_API_KEY" "https://cyber-risk.upguard.com/api/public/vendors"
Security Notes:
- Keep your API key secure and don’t share it publicly
- Only administrators can create and manage API keys
- You can create multiple API keys and delete them as needed
- The API base URL is:
https://cyber-risk.upguard.com/api/public
For more detailed information, see the official UpGuard API authentication guide.
Restart Required
After updating your MCP configuration, restart Claude Desktop or your IDE for the changes to take effect.
Documentation System
This project features a comprehensive documentation generation system that creates multiple formats from the source code:
📚 Available Documentation Formats
- 📊 Interactive Documentation Hub - Central navigation with statistics
- 🚀 Swagger UI - Interactive API explorer for testing endpoints
- 📚 Redoc - Beautiful, professional API documentation
- 📖 Markdown - Human-readable documentation with examples
- 🔧 OpenAPI Specification - Machine-readable API spec for tooling
🛠️ Documentation Commands
# Generate complete documentation pipeline
npm run docs:full
# Individual generation steps
npm run docs:extract # Extract tools from source code
npm run docs:generate # Generate OpenAPI and Markdown
npm run docs:html # Generate HTML documentation
npm run docs:test # Validate generated documentation
# Utility commands
npm run docs:clean # Clean generated files
npm run docs:build # Generate with mock fallback
📊 Documentation Statistics
- 67 API Tools documented across 13 categories
- 22 Schema Definitions with Zod validation
- 54 Tools with Schemas (80% schema coverage)
- 195KB OpenAPI Specification with comprehensive examples
- 37KB Markdown Documentation with authentication guides
🌐 Viewing Documentation
After running npm run docs:full
, open any of these files in your browser:
- Documentation Hub:
docs/generated/index.html
- Swagger UI:
docs/generated/swagger.html
- Redoc:
docs/generated/redoc.html
- Markdown:
docs/generated/API.md
- OpenAPI Spec:
docs/generated/openapi.json
API Categories
🛡️ Risk Management (10 tools)
- Get available risks and risk details
- Account and vendor risk monitoring
- Risk filtering and categorization
🏢 Vendor Management (16 tools)
- Monitor and manage vendor security
- Vendor risk assessments
- Bulk vendor operations
🌐 Domain Management (9 tools)
- Domain monitoring and analysis
- Subdomain discovery
- Domain risk assessment
🔍 IP Management (5 tools)
- IP address monitoring
- Network security analysis
- IP risk evaluation
📊 Report Generation (7 tools)
- Custom security reports
- Automated report scheduling
- Report data export
🚨 Breach Monitoring (2 tools)
- Data breach detection
- Breach impact analysis
⚡ Bulk Operations (6 tools)
- Batch processing capabilities
- Mass vendor updates
- Bulk data operations
🔗 Webhook Management (5 tools)
- Event notification setup
- Webhook configuration
- Real-time alerts
📋 Additional Categories
- Questionnaire Management (1 tool)
- Typosquat Detection (1 tool)
- Label Management (1 tool)
- Notification Management (1 tool)
- General (3 tools)
Development
Project Structure
├── src/ │ ├── tools/ # API tool implementations │ │ ├── schemas/ # Zod schema definitions │ │ ├── risks.js # Risk management tools │ │ ├── vendors.js # Vendor management tools │ │ └── ... # Other tool categories │ └── utils/ │ ├── doc-generator.js # Documentation generator │ └── logger.js # Logging utility ├── scripts/ │ ├── extract-tools-direct.js # Tool extraction │ ├── generate-docs.js # Documentation generation │ ├── generate-html-docs.js # HTML documentation │ └── test-docs.js # Documentation testing ├── docs/ │ ├── generated/ # Generated documentation │ └── extracted-tools.json # Extracted tool data └── .github/workflows/ └── docs.yml # CI/CD documentation pipeline
Adding New Tools
- Create tool implementation in appropriate category file
- Add schema definitions to
src/tools/schemas/index.js
- Run
npm run docs:full
to update documentation - Test with
npm run docs:test
Schema Validation
All tools use Zod schemas for input validation:
const { z } = require('zod');
const { vendorHostname, labels } = require('./schemas');
// Tool with schema validation
server.tool('tool_name', 'Description', {
hostname: vendorHostname,
labels: labels.optional()
}, async (args) => {
// Implementation
});
CI/CD Integration
The project includes automated documentation generation via GitHub Actions:
- Triggers: Push to main/master, tool file changes, manual dispatch
- Generates: All documentation formats automatically
- Deploys: GitHub Pages with interactive documentation
- Artifacts: Documentation files with 30-day retention
Testing
# Run all tests
npm test
# Lint code
npm run lint
npm run lint:fix
# Test documentation
npm run docs:test
Contributing
- Fork the repository
- Create a feature branch
- Add tools with proper schemas
- Update documentation with
npm run docs:full
- Test changes with
npm run docs:test
- Submit a pull request
License
MIT License - see LICENSE file for details.
Support
- GitHub Issues: Report bugs or request features
- Documentation: Available in multiple formats in
docs/generated/
- API Reference: Interactive Swagger UI and Redoc interfaces
UpGuard CyberRisk MCP Server v1.3.0 | Licensed under MIT | View Documentation
Dev Tools Supporting MCP
The following are the main code editors that support the Model Context Protocol. Click the link to visit the official website for more information.