feat: Add VulniCheck MCP Server to Community list #2180
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
VulniCheck MCP Serveris a handy tool that will assist you real-time during vibe coding about the potential risks of importing a particular module into your application. It queries OSV.dev, NVD, and GitHub Advisory databases for comprehensive vulnerability coverage, provides CVSS scores and CWE mappings, scans requirements.txt/pyproject.toml files, automatically discovers imports from Python source files when no dependency file exists, checks specific package versions or latest releases, detects secrets in code, and inspects currently installed packages in your environment. I am using it on a daily basis in my IDE-s.
Server Details
Motivation and Context
This change adds a new community-contributed MCP server to the list, making it discoverable for users.
How Has This Been Tested?
Tested with VSCode, Cursor, Cline, and Claude Code.
Breaking Changes
None.
Types of changes
Checklist