
Uygar PinarI wanted a single interface where an AI agent could run WHOIS, pull SSL certs, enumerate subdomains,...
I wanted a single interface where an AI agent could run WHOIS, pull SSL certs, enumerate subdomains, check CVEs, and query threat intel feeds — all from one prompt.
So I built 23 security tools as an MCP server. Any AI agent that speaks MCP can call them natively.
Here's what I built, how to set it up, and what I learned.
Let me start with the setup because it's the simplest part.
Add this to your MCP client config:
{
"mcpServers": {
"contrast": {
"command": "npx",
"args": ["-y", "@anthropic-ai/mcp-remote", "https://api.contrastcyber.com/mcp/"]
}
}
}
Works with Claude Desktop, Cursor, Windsurf, Cline, VS Code — anything that speaks MCP.
No API key. No signup. 100 requests/hour free.
| Tool | What it does |
|---|---|
domain_report |
Full security report — DNS, WHOIS, SSL, subdomains, risk score |
dns_lookup |
A, AAAA, MX, NS, TXT, CNAME, SOA records |
whois_lookup |
Registrar, creation date, expiry, nameservers |
ssl_check |
Certificate chain, cipher suite, expiry, grade (A-F) |
subdomain_enum |
Brute-force + Certificate Transparency logs |
tech_fingerprint |
CMS, frameworks, CDN, analytics, server stack |
scan_headers |
Live HTTP security headers — CSP, HSTS, X-Frame-Options |
email_mx |
Mail provider, SPF/DMARC/DKIM validation |
ip_lookup |
PTR, open ports, hostnames, reputation |
asn_lookup |
AS number, holder, IP prefixes |
Real scenario: "Check if any of our subdomains have expiring SSL certs" — the agent calls subdomain_enum, loops through each result with ssl_check, and reports which ones expire within 30 days. Zero code.
| Tool | What it does |
|---|---|
cve_lookup |
CVE details, CVSS, EPSS score, KEV status |
cve_search |
Search by product, severity, or date range |
exploit_lookup |
Public exploits from GitHub Advisory + ExploitDB |
Real scenario: "Find all critical CVEs for Apache httpd from the last 6 months that have public exploits" — one sentence, three tool calls chained automatically.
| Tool | What it does |
|---|---|
ioc_lookup |
Auto-detect IP/domain/URL/hash → ThreatFox + URLhaus |
hash_lookup |
Malware hash reputation via MalwareBazaar |
phishing_check |
Known phishing/malware URL check |
password_check |
Breach check via HIBP (k-anonymity, password never sent) |
email_disposable |
Disposable/temporary email detection |
Real scenario: You get a suspicious URL in Slack. Paste it and ask "is this safe?" — the agent runs phishing_check + ioc_lookup and tells you if it's a known threat.
| Tool | What it does |
|---|---|
check_secrets |
Detect hardcoded AWS keys, tokens, passwords in source |
check_injection |
SQL injection, command injection, path traversal |
check_headers |
Validate security header configuration |
Real scenario: Before a PR merge, ask your agent to scan the diff for hardcoded secrets and injection vulnerabilities.
| Tool | What it does |
|---|---|
phone_lookup |
Validation, country, carrier, line type |
"Run a full security audit on example.com"
Domain: example.com
Risk Score: 32/100 (Low)
DNS: 6 records found
SSL: Grade A, expires 2027-01-15, TLS 1.3
Headers: 4/7 present (missing CSP, HSTS preload, Permissions-Policy)
Subdomains: 3 found
WHOIS: Registered 1995-08-14, ICANN
Tech: Akamai CDN, nginx
"Check if CVE-2024-3094 has public exploits"
CVE-2024-3094 (xz backdoor)
CVSS: 10.0 CRITICAL
EPSS: 0.947 (top 0.1%)
KEV: Yes — actively exploited
Exploits found: 3
"Is this password breached: hunter2"
EXPOSED in 17,043 breaches
Do NOT use this password.
(checked via k-anonymity — password was never transmitted)
ContrastAPI is also a REST API with a Node.js SDK. You can curl it from any language.
But MCP changes the workflow:
Without MCP: Call endpoint → parse JSON → decide next step → call another endpoint → parse again → format output.
With MCP: "Audit this domain." Done.
The agent picks the right tools, chains them, and gives you a summary. You focus on decisions, not plumbing.
1. No API key = fastest adoption.
I removed the API key requirement and traffic jumped immediately. Zero friction wins. The free tier (100 req/hr) is generous enough that nobody has hit the limit yet.
2. MCP users are stickier.
MCP users make more requests per session than REST users. Once an agent has access to the tools, it chains them naturally — a single prompt can trigger 5-10 tool calls.
3. Get listed everywhere, early.
mcp.so, mcpservers.org, Smithery — these directories drive most of the discovery right now. The ecosystem is early and low-competition.
Being transparent about what this isn't:
Free. Open source. No API key.
If you find it useful, a ⭐ on GitHub helps more than you think.
What security tools do you wish your AI agent could use? I'm always looking for what to build next.