com.exploit-intel/eip-mcp
Exploit Intelligence Platform — CVE, Vulnerability and Exploit Database
Real-time CVE, exploit, and vulnerability intelligence for AI assistants (350K+ CVEs, 115K+ PoCs)
Status
Failing
Score
58.0
Transport
streamable-http
Tools
0
Production readiness
Verdict
Needs remediation
Current validation evidence shows operational or discovery gaps that should be fixed first.
Critical alerts
1
Production verdicts degrade quickly when critical alerts are active.
Evidence confidence
Confidence score
55.0
Based on 20 recent validations, 26 captured checks, and validation age of 598.2 hours.
Live checks captured
26
More direct checks increase trust in the current verdict.
Validation age
598.2h
Lower age means fresher evidence.
Recommended for
Generic Streamable HTTP
Generic Streamable HTTP is marked compatible with score 83.
Client readiness verdicts
Ready for ChatGPT custom connector
Partial
OpenAI connectors expect OAuth for remote server auth.; Dynamic client registration materially improves connector setup.; tools/list must succeed.
Confidence: medium (55.0)
Evidence provenance
Winner: live_validation
Supporting sources: live_validation, history, server_card
Disagreements: none
initialize• OKtools_list• Errortransport_compliance_probe• Warningstep_up_auth_probe• Missingconnector_replay_probe• Missing — Frozen tool snapshots must survive refresh.request_association_probe• Missing — Roots, sampling, and elicitation should stay request-scoped.
Ready for Claude remote MCP
Partial
tools/list must succeed.; A useful Claude integration needs at least one exposed tool.
Confidence: medium (55.0)
Evidence provenance
Winner: live_validation
Supporting sources: live_validation, history, server_card
Disagreements: none
initialize• OKtools_list• Errortransport_compliance_probe• Warning
Unsafe for write actions
No
Current write surface is bounded enough for cautious review.
Confidence: medium (55.0)
Evidence provenance
Winner: live_validation
Supporting sources: live_validation, history
Disagreements: none
action_safety_probe• OK
Snapshot churn risk
Low
No material tool-surface churn detected in the latest comparison.
Confidence: medium (55.0)
Evidence provenance
Winner: history
Supporting sources: history, live_validation
Disagreements: none
tool_snapshot_probe• Missingconnector_replay_probe• Missing
Why not ready by client
ChatGPT custom connector
Partial
Remediation checklist
- No explicit blockers recorded.
Claude remote MCP
Partial
Remediation checklist
- No explicit blockers recorded.
Write-safe publishing
Ready
Remediation checklist
- No explicit blockers recorded.
Verdict traces
Production verdict
Needs remediation
Current validation evidence shows operational or discovery gaps that should be fixed first.
Confidence: medium (55.0)
Winning source: live_validation
Triggering alerts
validation_stale• medium • Validation evidence is staleserver_failing• critical • Latest validation is failing
Client verdict trace table
| Verdict | Status | Checks | Winning source | Conflicts |
|---|---|---|---|---|
openai_connectors |
Partial | initialize, tools_list, transport_compliance_probe, step_up_auth_probe, connector_replay_probe, request_association_probe | live_validation | none |
claude_desktop |
Partial | initialize, tools_list, transport_compliance_probe | live_validation | none |
unsafe_for_write_actions |
No | action_safety_probe | live_validation | none |
snapshot_churn_risk |
Low | tool_snapshot_probe, connector_replay_probe | history | none |
Publishability policy profiles
ChatGPT custom connector publishability
Caution
OpenAI connectors expect OAuth for remote server auth.; Dynamic client registration materially improves connector setup.; tools/list must succeed.
- Search Fetch Only: No
- Write Actions Present: No
- Oauth Configured: No
- Admin Refresh Required: No
- Safe For Company Knowledge: No
- Safe For Messages Api Remote Mcp: No
Claude remote MCP publishability
Caution
tools/list must succeed.; A useful Claude integration needs at least one exposed tool.
- Search Fetch Only: No
- Write Actions Present: No
- Oauth Configured: No
- Admin Refresh Required: No
- Safe For Company Knowledge: No
- Safe For Messages Api Remote Mcp: No
Compatibility fixtures
ChatGPT custom connector fixture
Degraded
OpenAI connectors expect OAuth for remote server auth.; Dynamic client registration materially improves connector setup.; tools/list must succeed.
- remote_http_endpoint: Passes
- oauth_discovery: Degraded
- frozen_tool_snapshot_refresh: Passes
- request_association: Passes
Anthropic remote MCP fixture
Degraded
tools/list must succeed.; A useful Claude integration needs at least one exposed tool.
- remote_transport: Passes
- tool_discovery: Likely to fail
- auth_connect: Passes
- safe_write_review: Passes
Authenticated validation sessions
Latest profile
remote_mcp
Authenticated session used
Public score isolation
Preview endpoint
/v1/verifyCI preview endpoint
/v1/ci/previewPublic server reputation
Validation success 7d
n/a
Validation success 30d
0.0
Mean time to recover
n/a
Breaking diffs 30d
0
Registry drift frequency 30d
0
Snapshot changes 30d
0
Incident & change feed
| Timestamp | Event | Details |
|---|---|---|
| Apr 09, 2026 08:33:27 AM UTC | Latest validation: failing | Score 58.0 with status failing. |
Capabilities
- OAuth:
- DCR/CIMD:
- Prompts:
- Homepage: https://exploit-intel.com
- Docs: none
- Support: none
- Icon: none
- Remote endpoint: https://mcp.exploit-intel.com/mcp
- Server card: none
Use-case taxonomy
database security
Security posture
Tools analyzed
0
High-risk tools
0
Destructive tools
0
Exec tools
0
Egress tools
0
Secret tools
0
Bulk-access tools
0
Risk distribution
none
Tool capability & risk inventory
No tool inventory available from the latest validation run.
Write-action governance
Governance status
OK
Safe to publish
Auth boundary
public_or_unclear
Blast radius
Low
High-risk tools
0
Confirmation signals
none
Safeguard count
0
Status detail: No unsafe write-action governance gaps detected on the latest validation.
| Tool | Risk | Flags | Safeguards |
|---|---|---|---|
| No high-risk tools were detected on the latest run. | |||
Action-controls diff
Need at least two validation runs before diffing action controls.
Why this score?
Access & Protocol
31.5/44
Connectivity, auth, and transport expectations for common clients.
Interface Quality
13.88/56
How well the tool/resource interface communicates and behaves under automation.
Security Posture
25/36
How safely the exposed tool surface handles destructive actions, egress, execution, secrets, and risky inputs.
Reliability & Trust
17.83/24
Operational stability, consistency, and trustworthiness over time.
Discovery & Governance
21.5/28
How well the server is documented, listed, and governed in public registries.
Adoption & Market
4/8
Adoption clues and public evidence that the server is intended for external use.
Algorithmic score breakdown
Auth Operability
2/4
Measures whether auth discovery and protected access behave predictably for clients.
Error Contract Quality
0.5/4
Grades machine-readable error structure, status alignment, and remediation hints.
Rate-Limit Semantics
2/4
Checks whether quota/throttle responses are deterministic and automation-friendly.
Schema Completeness
0/4
Completeness of tool descriptions, parameter docs, examples, and schema shape.
Backward Compatibility
4/4
Stability score across tool schema/name drift relative to prior validations.
SLO Health
3/4
Availability, latency, and burst-failure profile across recent validation history.
Security Hygiene
3/4
HTTPS posture, endpoint hygiene, and response-surface hardening checks.
Task Success
3.3/4
Can an agent reliably initialize, enumerate tools, and execute core MCP flows?
Trust Confidence
2/4
Confidence-adjusted reliability score that penalizes low evidence volume.
Abuse/Noise Resilience
2.5/4
How well the server preserves core behavior in the presence of noisy traffic patterns.
Prompt Contract
2/4
Quality of prompt metadata, argument shape, and prompt discoverability for clients.
Resource Contract
2/4
How completely resources and resource templates describe URIs, types, and usage shape.
Discovery Metadata
4/4
Homepage, docs, icon, repository, support, and license coverage for directory consumers.
Registry Consistency
2/4
Agreement between stored registry metadata, live server-card data, and current validation output.
Installability
2/4
How cleanly a real client can connect, initialize, enumerate tools, and proceed through auth.
Session Semantics
2.5/4
Determinism and state behavior across repeated MCP calls, including sticky-session surprises.
Tool Surface Design
0/4
Naming clarity, schema ergonomics, and parameter complexity across the tool surface.
Result Shape Stability
0/4
Stability of declared output schemas across validations, with penalties for drift or missing shapes.
OAuth Interop
3/4
Depth and client compatibility of OAuth/OIDC metadata beyond the minimal protected-resource check.
Recovery Semantics
0.4/4
Whether failures include actionable machine-readable next steps such as retry or upgrade guidance.
Maintenance Signal
3/4
Versioning, update recency, and historical validation cadence that indicate active stewardship.
Adoption Signal
2/4
Directory presence and distribution clues that suggest the server is intended for external use.
Freshness Confidence
3/4
Confidence that recent validations are current enough and dense enough to trust operationally.
Transport Fidelity
4/4
Whether declared transport metadata matches the observed endpoint behavior and response formats.
Spec Recency
2/4
How close the server’s claimed MCP protocol version is to the latest known public revision.
Session Resume
4/4
Whether Streamable HTTP session identifiers and resumed requests behave cleanly for real clients.
Step-Up Auth
3/4
Whether OAuth metadata and WWW-Authenticate challenges support granular, incremental consent instead of broad upfront scopes.
Transport Compliance
3/4
Checks session headers, protocol-version enforcement, session teardown, and expired-session behavior.
Utility Coverage
2/4
Signals support for completions, pagination, and task-oriented utility surfaces that larger clients increasingly expect.
Advanced Capability Coverage
2/4
Coverage of newer MCP surfaces like roots, sampling, elicitation, structured output, and related metadata.
Connector Publishability
2/4
How ready the server looks for client catalogs and managed connector programs.
Tool Snapshot Churn
0/4
Stability of the tool surface across recent validations, including add/remove and output-shape drift.
Connector Replay
3/4
Whether a previously published frozen connector snapshot would remain backward compatible after the latest tool refresh.
Request Association
3/4
Whether roots, sampling, and elicitation appear tied to active client requests instead of arriving unsolicited on idle sessions.
Interactive Flow Safety
3/4
Whether prompts and docs steer users toward safe auth flows instead of pasting secrets directly.
Action Safety
3/4
Risk-weighted view of destructive, exec, egress, and confirmation semantics across the tool surface.
Official Registry Presence
4/4
Whether the server appears directly or indirectly in the official MCP registry.
Provenance Divergence
4/4
How closely official registry metadata, the live server card, and public repo/package signals agree with each other.
Safety Transparency
2/4
Clarity of docs, auth disclosure, support links, and other trust signals visible to integrators.
Tool Capability Clarity
0/4
How clearly the tool surface communicates whether each action reads, writes, deletes, executes, or exports data.
Destructive Operation Safety
3/4
Penalizes delete/revoke/destroy style tools unless auth and safeguards reduce blast radius.
Egress / SSRF Resilience
3/4
Assesses arbitrary URL fetch, crawl, webhook, and remote-request exposure on the tool surface.
Execution / Sandbox Safety
4/4
Evaluates shell, code, script, and command-execution exposure and whether that surface appears contained.
Data Exfiltration Resilience
3/4
Assesses export, dump, backup, and bulk-read behavior against the surrounding auth and safeguard signals.
Least Privilege Scope
3/4
Rewards scoped auth metadata and penalizes broad or missing scopes around privileged tools.
Secret Handling Hygiene
3/4
Assesses secret-bearing tools, token leakage risk, and whether the public surface avoids obvious secret exposure.
Supply Chain Signal
2.5/4
Public metadata signal for repository, changelog, license, versioning, and recency that supports supply-chain trust.
Input Sanitization Safety
0/4
Penalizes risky freeform string inputs when schemas do not constrain URLs, code, paths, queries, or templates.
Tool Namespace Clarity
0/4
Measures naming uniqueness and ambiguity across the tool namespace to reduce collision and confusion risk.
Compatibility profiles
OpenAI Connectors
66.7
partial
OpenAI connectors expect OAuth for remote server auth.; Dynamic client registration materially improves connector setup.; tools/list must succeed.
Connector URL: https://mcp.exploit-intel.com/mcp # No OAuth metadata detected. # Server: com.exploit-intel/eip-mcp
Claude Desktop
66.7
partial
tools/list must succeed.; A useful Claude integration needs at least one exposed tool.
{
"mcpServers": {
"eip-mcp": {
"command": "npx",
"args": ["mcp-remote", "https://mcp.exploit-intel.com/mcp"]
}
}
}
Smithery
60.0
partial
Tool discovery must succeed.; Machine-readable failure semantics should be present.
smithery mcp add "https://mcp.exploit-intel.com/mcp"
Generic Streamable HTTP
83.3
compatible
tools/list must succeed.
curl -sS https://mcp.exploit-intel.com/mcp -H 'content-type: application/json' -d '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2025-03-26","capabilities":{},"clientInfo":{"name":"mcp-verify","version":"0.1.0"}}}'
Actionable remediation
| Severity | Remediation | Why it matters | Recommended action |
|---|---|---|---|
| Critical | Ensure tools/list succeeds consistently | Tools discovery is the minimum viable contract for most MCP clients and directories. | Make tools/list succeed unauthenticated when possible, or document the auth flow in the server card.Playbook
|
| Critical | Respond to latest validation is failing | Core MCP flows did not validate successfully on the latest run. | Fix the failing checks first, then revalidate to confirm the recovery path.Playbook
|
| High | Align session and protocol behavior with Streamable HTTP expectations | Clients increasingly rely on MCP-Protocol-Version, session teardown, and expired-session semantics. | Align MCP-Protocol-Version, MCP-Session-Id, DELETE teardown, and expired-session handling with the transport spec.Playbook
|
| High | Associate roots, sampling, and elicitation with active client requests | Modern MCP guidance expects roots, sampling, and elicitation traffic to be tied to an active client request instead of arriving unsolicited on idle sessions. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| High | Expose /.well-known/oauth-protected-resource | Without a protected-resource document, OAuth clients cannot discover auth requirements reliably. | Serve /.well-known/oauth-protected-resource and point it at your authorization server metadata.Playbook
|
| High | Keep connector refreshes backward compatible | Managed connector clients freeze tool snapshots, so removed tools, new required args, and breaking output changes can break published integrations after refresh. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| High | Publish OAuth authorization-server metadata | Clients need authorization-server metadata to discover issuer, endpoints, and DCR support. | Publish /.well-known/oauth-authorization-server from your issuer and include registration_endpoint when supported.Playbook
|
| High | Publish a complete server card | Missing or incomplete server-card metadata weakens discovery, documentation, and trust signals. | Serve /.well-known/mcp/server-card.json and include tools, prompts/resources, homepage, and support links.Playbook
|
| High | Stop asking users to paste secrets directly | Public MCP servers should prefer OAuth or browser-based auth guidance over in-band secret collection. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Adopt a current MCP protocol revision | Older protocol revisions reduce compatibility with newer clients and registry programs. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Close connector-publishing gaps | Connector catalogs care about protocol recency, session behavior, auth clarity, and tool-surface stability. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Document minimal scopes and return cleaner auth challenges | Modern clients expect granular scopes and step-up auth signals such as WWW-Authenticate scope hints. | Return granular scopes and WWW-Authenticate challenge hints instead of forcing overly broad auth upfront.Playbook
|
| Medium | Publish OpenID configuration | OIDC metadata improves token validation and client compatibility. | Expose /.well-known/openid-configuration with issuer, jwks_uri, and supported grants.Playbook
|
| Medium | Raise Adoption & Market score | Adoption clues and public evidence that the server is intended for external use. | Increase external documentation and directory coverage so users can discover and evaluate the server.Playbook
|
| Medium | Raise Interface Quality score | How well the tool/resource interface communicates and behaves under automation. | Improve schemas, error contracts, and recovery messages so agents can reason about the surface automatically.Playbook
|
| Medium | Reduce tool-surface churn | Frequent add/remove or output-shape drift makes published connectors and cached tool snapshots brittle. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Repair prompts/list or stop advertising prompts | Prompt metadata should either work live or be removed from the advertised capability set. | Only advertise prompts if prompts/list works and prompt arguments are documented.Playbook
|
| Medium | Repair resources/list or stop advertising resources | Resource metadata should either work live or be removed from the advertised capability set. | Only advertise resources if resources/list works and resources expose stable URIs/types.Playbook
|
| Medium | Respond to validation evidence is stale | Latest validation is 598.2 hours old. | Trigger a fresh validation run or increase scheduler priority for this server.Playbook
|
| Low | Expose modern utility surfaces like completions, pagination, or tasks | Utility coverage improves interoperability with larger clients and long-lived agent workflows. | Expose completions, pagination, and task metadata where supported so larger clients can plan and resume work safely.Playbook
|
| Low | Publish newer MCP capability signals | Roots, sampling, elicitation, structured outputs, and related metadata improve client understanding and ranking. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
Point loss breakdown
| Component | Current | Points missing |
|---|---|---|
| Tool Surface Design | 0/4 | -4.0 |
| Tool Snapshot Churn | 0/4 | -4.0 |
| Tool Namespace Clarity | 0/4 | -4.0 |
| Tool Capability Clarity | 0/4 | -4.0 |
| Schema Completeness | 0/4 | -4.0 |
| Result Shape Stability | 0/4 | -4.0 |
| Input Sanitization Safety | 0/4 | -4.0 |
| Recovery Semantics | 0.4/4 | -3.6 |
| Error Contract | 0.5/4 | -3.5 |
| Utility Coverage | 2/4 | -2.0 |
| Trust Confidence | 2/4 | -2.0 |
| Spec Recency | 2/4 | -2.0 |
Validation diff
Score delta
0
Summary changed
no
Tool delta
0
Prompt delta
0
Auth mode changed
no
Write surface expanded
no
Protocol regressed
no
Registry drift changed
no
Regressed checks: none
Improved checks: none
| Component | Previous | Latest | Delta |
|---|---|---|---|
| No component deltas between the latest two runs. | |||
Tool snapshot diff & changelog
Need at least two validation runs before building a tool changelog.
Connector replay
Status
Missing
Backward compatible
Would break after refresh
Added tools
none
Removed tools
none
Additive output changes
none
Required-argument replay breaks
| Tool | Added required args | Removed required args |
|---|---|---|
| No required-argument replay breaks detected. | ||
Output-schema replay breaks
| Tool | Removed properties | Added properties |
|---|---|---|
| No output-schema replay breaks detected. | ||
Transport compliance drilldown
Probe status
Warning
Transport
streamable-http
Session header
yes
Protocol header
no
Bad protocol response
400
DELETE teardown
200
Expired session retry
404
Last-Event-ID visible
no
Issues: missing_protocol_header
Request association
Status
Missing
Advertised capabilities
none
Observed idle methods
none
Violating methods
none
Probe HTTP status
n/a
Issues
none
Utility coverage
Probe status
Missing
Completions
not detected
Completion probe target: none
Pagination
not detected
No nextCursor evidence.
Tasks
Missing
Advertised: no
Benchmark tasks
| Benchmark task | Status | Evidence |
|---|---|---|
| Discover tools | Likely to fail |
|
| Read-only fetch flow | Likely to fail |
|
| OAuth-required connect | Degraded |
|
| Safe write flow with confirmation | Passes |
|
Registry & provenance divergence
Probe status
OK
Direct official match
yes
Drift fields
none
| Field | Registry | Live server card |
|---|---|---|
| Title | n/a | n/a |
| Version | n/a | n/a |
| Homepage | n/a | n/a |
Active alerts
- Validation evidence is stale (medium)
Latest validation is 598.2 hours old. - Latest validation is failing (critical)
Core MCP flows did not validate successfully on the latest run.
Aliases & registry graph
| Identifier | Source | Canonical | Score |
|---|---|---|---|
com.exploit-intel/eip-mcp |
official_registry | yes | 58.02 |
Alias consolidation
Canonical identifier
com.exploit-intel/eip-mcp
Duplicate aliases
0
Registry sources
official_registry
Remote URLs
Homepages
Source disagreements
| Field | What differs | Observed values |
|---|---|---|
| No source disagreements detected. | ||
Install snippets
Openai Connectors
Connector URL: https://mcp.exploit-intel.com/mcp # No OAuth metadata detected. # Server: com.exploit-intel/eip-mcp
Claude Desktop
{
"mcpServers": {
"eip-mcp": {
"command": "npx",
"args": ["mcp-remote", "https://mcp.exploit-intel.com/mcp"]
}
}
}
Smithery
smithery mcp add "https://mcp.exploit-intel.com/mcp"
Generic Http
curl -sS https://mcp.exploit-intel.com/mcp -H 'content-type: application/json' -d '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2025-03-26","capabilities":{},"clientInfo":{"name":"mcp-verify","version":"0.1.0"}}}'
Agent access & tool surface
Live server tools
No live tool surface captured yet.
Observed from the latest live validation against https://mcp.exploit-intel.com/mcp. This is the target server surface, not Verify's own inspection tools.
Live capability counts
0 tools • 0 prompts • 0 resources
Counts come from the latest
tools/list, prompts/list, and resources/list checks.Inspect with Verify
search_servers recommend_servers get_server_report compare_servers
Use Verify itself to search, recommend, compare, and fetch the full report for
com.exploit-intel/eip-mcp.Direct machine links
Claims & monitoring
Server ownership
No verified maintainer claim recorded.
Watch subscriptions
0
Teams: none
Alert routing
Active watches
0
Generic webhooks
0
Slack routes
0
Teams routes
0
Email routes
0
| Watch | Team | Channels | Minimum severity |
|---|---|---|---|
| No active watch destinations. | |||
Maintainer analytics
Validation Run Count
20
Average Latency Ms
982.27
Healthy Run Ratio Recent
0.0
Registry Presence Count
1
Active Alert Count
2
Watcher Count
0
Verified Claim
False
Taxonomy Tags
database, security
Score Trend
58.02, 58.02, 58.02, 58.02, 58.02, 58.02, 58.02, 58.02, 58.02, 58.02
Remediation Count
21
High Risk Tool Count
0
Destructive Tool Count
0
Exec Tool Count
0
Maintainer response quality
Score
16.67
Verified claim
Support contact
Changelog present
Incident notes present
Tool changes documented
Annotation history
Annotation count
0
Maintainer annotations
No maintainer annotations have been recorded yet.
Maintainer rebuttals & expected behavior
No maintainer rebuttals or expected-behavior overrides are recorded yet.
Latest validation evidence
Latest summary
Failing
Validation profile
remote_mcp
Started
Apr 09, 2026 08:33:26 AM UTC
Latency
959.2 ms
Failures
oauth_authorization_serverno authorization serveroauth_protected_resourceClient error '404 Not Found' for url 'https://mcp.exploit-intel.com/.well-known/oauth-protected-resource' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404openid_configurationno authorization serverserver_cardClient error '404 Not Found' for url 'https://mcp.exploit-intel.com/.well-known/mcp/server-card.json' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404tools_listClient error '400 Bad Request' for url 'https://mcp.exploit-intel.com/mcp/' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400
Checks
| Check | Status | Latency | Evidence |
|---|---|---|---|
action_safety_probe |
OK | n/a | No high-risk write, destructive, or exec tools detected. |
advanced_capabilities_probe |
Missing | n/a | No advanced MCP capability signals detected. |
connector_publishability_probe |
Error | n/a | Publishability blockers: tools list, server card, tool surface. |
connector_replay_probe |
Missing | n/a | No connector replay evidence recorded. |
determinism_probe |
Missing | n/a | tools list unavailable |
initialize |
OK | 81.2 ms | Protocol 2025-03-26 |
interactive_flow_probe |
Missing | n/a | Check completed |
oauth_authorization_server |
Missing | n/a | no authorization server |
oauth_protected_resource |
Error | 44.7 ms | Client error '404 Not Found' for url 'https://mcp.exploit-intel.com/.well-known/oauth-protected-resource' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 |
official_registry_probe |
OK | n/a | Check completed |
openid_configuration |
Missing | n/a | no authorization server |
probe_noise_resilience |
OK | 42.5 ms | Fetched https://mcp.exploit-intel.com/robots.txt |
prompt_get |
Missing | n/a | not advertised |
prompts_list |
Missing | 84.4 ms | Client error '400 Bad Request' for url 'https://mcp.exploit-intel.com/mcp/' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 |
protocol_version_probe |
Warning | n/a | Claims 2025-03-26; 2 release(s) behind 2025-11-25. |
provenance_divergence_probe |
OK | n/a | Check completed |
request_association_probe |
Missing | n/a | No request-association capabilities were advertised. |
resource_read |
Missing | n/a | not advertised |
resources_list |
Missing | 76.5 ms | Client error '400 Bad Request' for url 'https://mcp.exploit-intel.com/mcp/' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 |
server_card |
Error | 67.9 ms | Client error '404 Not Found' for url 'https://mcp.exploit-intel.com/.well-known/mcp/server-card.json' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 |
session_resume_probe |
OK | 60.6 ms | 17 tool(s) exposed |
step_up_auth_probe |
Missing | n/a | No OAuth or incremental-scope signals detected. |
tool_snapshot_probe |
Missing | n/a | no tools |
tools_list |
Error | 71.2 ms | Client error '400 Bad Request' for url 'https://mcp.exploit-intel.com/mcp/' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 |
transport_compliance_probe |
Warning | 103.5 ms | Issues: missing protocol header (bad protocol=400, DELETE=200, expired session=404). |
utility_coverage_probe |
Missing | 49.3 ms | No completions evidence; no pagination evidence; tasks missing. |
Raw evidence view
Show raw JSON evidence
{
"checks": {
"action_safety_probe": {
"details": {
"auth_present": false,
"confirmation_signals": [],
"safeguard_count": 0,
"summary": {
"bulk_access_tools": 0,
"capability_distribution": {},
"destructive_tools": 0,
"egress_tools": 0,
"exec_tools": 0,
"high_risk_tools": 0,
"risk_distribution": {
"critical": 0,
"high": 0,
"low": 0,
"medium": 0
},
"secret_tools": 0,
"tool_count": 0
}
},
"latency_ms": null,
"status": "ok"
},
"advanced_capabilities_probe": {
"details": {
"capabilities": {
"completions": false,
"elicitation": false,
"prompts": false,
"resource_links": false,
"resources": false,
"roots": false,
"sampling": false,
"structured_outputs": false
},
"enabled": [],
"enabled_count": 0,
"initialize_capability_keys": [
"experimental",
"prompts",
"tools"
]
},
"latency_ms": null,
"status": "missing"
},
"connector_publishability_probe": {
"details": {
"blockers": [
"tools_list",
"server_card",
"tool_surface"
],
"criteria": {
"action_safety": true,
"auth_flow": true,
"connector_replay": true,
"initialize": true,
"protocol_version": true,
"remote_transport": true,
"request_association": true,
"server_card": false,
"session_resume": true,
"step_up_auth": true,
"tool_surface": false,
"tools_list": false,
"transport_compliance": true
},
"high_risk_tools": 0,
"tool_count": 0,
"transport": "streamable-http"
},
"latency_ms": null,
"status": "error"
},
"connector_replay_probe": {
"details": {
"reason": "no_tools"
},
"latency_ms": null,
"status": "missing"
},
"determinism_probe": {
"details": {
"reason": "tools_list_unavailable"
},
"latency_ms": null,
"status": "missing"
},
"initialize": {
"details": {
"headers": {
"content-type": "text/event-stream",
"mcp-session-id": "b8ced41d588645879322b4ddc350e7e8",
"strict-transport-security": "max-age=31536000; includeSubDomains"
},
"http_status": 200,
"payload": {
"id": 1,
"jsonrpc": "2.0",
"result": {
"capabilities": {
"experimental": {},
"prompts": {
"listChanged": false
},
"tools": {
"listChanged": false
}
},
"instructions": "You have access to the Exploit Intelligence Platform (EIP) \u2014 370K+ vulnerabilities and 105K+ exploits from NVD, CISA KEV, EPSS, ExploitDB, Metasploit, GitHub, and nomi-sec.\n\nTOOL SELECTION GUIDE:\n- \"What vulns affect OpenSSH?\" or any vendor/product query \u2192 search_vulnerabilities (has full-text query= param)\n- Specific CVE ID mentioned \u2192 get_vulnerability (full brief with ranked exploits, AI analysis, MITRE ATT&CK)\n- \"Find all Metasploit modules\" or filter exploits by source/language/author \u2192 search_exploits (structured filters ONLY \u2014 no free-text query)\n- \"Find reliable RCE exploits\" \u2192 search_exploits with attack_type, complexity, reliability filters\n- \"Exploits for CVE-2024-XXXX\" \u2192 PREFER get_vulnerability (includes exploits). Use search_exploits with cve= only if you need to page through 50+ exploits.\n- Trojans or backdoored exploits \u2192 search_exploits with llm_classification=trojan\n- All exploits from a vendor \u2192 search_exploits with vendor= filter\n- Exploit authors \u2192 list_authors or get_author\n- Vulnerability types or CWEs \u2192 list_cwes or get_cwe\n- Which vendors have the most vulns \u2192 list_vendors\n- \"What products does Microsoft have?\" or need exact product names \u2192 list_products\n- EDB number or GHSA ID \u2192 lookup_alt_id to resolve to CVE\n- Tech stack risk assessment \u2192 audit_stack\n- Nuclei templates or Shodan/FOFA/Google dorks \u2192 get_nuclei_templates\n- Pentest report finding \u2192 generate_finding\n- Read exploit source code \u2192 get_exploit_code\n- Full AI analysis for a single exploit (trojan check, MITRE, summary) \u2192 get_exploit_analysis\n\nIMPORTANT \u2014 search_vulnerabilities vs search_exploits:\n- search_vulnerabilities supports free-text query= (\"openssh\", \"log4j\", \"apache httpd\"). START HERE for product research.\n- search_exploits has NO query param. It only has structured filters (source, language, cve, vendor, product, attack_type, etc.).\n- To find exploits for a product: search_vulnerabilities first \u2192 then get_vulnerability on interesting CVEs (exploits are included).\n\nKEY CONCEPTS:\n- EPSS: Probability (0-100%) that a CVE will be exploited in the next 30 days. >90% is very high risk.\n- CVSS: Severity score (0-10). Critical >= 9.0, High >= 7.0, Medium >= 4.0.\n- KEV: CISA Known Exploited Vulnerabilities \u2014 confirmed actively exploited in the wild.\n- Exploit ranking: Metasploit modules > verified ExploitDB > GitHub by stars. Trojans flagged at bottom.\n- AI Analysis: 61K+ exploits analyzed. Results include attack_type (RCE, SQLi, XSS, DoS, LPE, auth_bypass, info_leak), complexity (trivial/simple/moderate/complex), reliability (reliable/unreliable/untested/theoretical), target_software, MITRE ATT&CK techniques, and deception_indicators for trojans.\nMULTI-TOOL WORKFLOWS:\n- \"Tell me about CVE-XXXX\": get_vulnerability \u2192 full brief including exploits with MITRE techniques\n- \"What vulns affect Apache?\": search_vulnerabilities(query=\"apache httpd\", has_exploits=true) \u2192 get_vulnerability on top hits\n- \"What should I worry about?\": audit_stack with technologies \u2192 get_vulnerability on top findings\n- \"Is there a Metasploit module for X?\": get_vulnerability \u2192 check METASPLOIT MODULES section\n- \"Write a finding for my report\": generate_finding with CVE, target, and notes\n",
"protocolVersion": "2025-03-26",
"serverInfo": {
"name": "eip-mcp",
"version": "0.3.17"
}
}
},
"url": "https://mcp.exploit-intel.com/mcp"
},
"latency_ms": 81.18,
"status": "ok"
},
"interactive_flow_probe": {
"details": {
"oauth_supported": false,
"prompt_available": false,
"risk_hits": [],
"safe_hits": []
},
"latency_ms": null,
"status": "missing"
},
"oauth_authorization_server": {
"details": {
"reason": "no_authorization_server"
},
"latency_ms": null,
"status": "missing"
},
"oauth_protected_resource": {
"details": {
"error": "Client error '404 Not Found' for url 'https://mcp.exploit-intel.com/.well-known/oauth-protected-resource'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://mcp.exploit-intel.com/.well-known/oauth-protected-resource"
},
"latency_ms": 44.66,
"status": "error"
},
"official_registry_probe": {
"details": {
"direct_match": true,
"official_peer_count": 1,
"registry_identifier": "com.exploit-intel/eip-mcp",
"registry_source": "official_registry"
},
"latency_ms": null,
"status": "ok"
},
"openid_configuration": {
"details": {
"reason": "no_authorization_server"
},
"latency_ms": null,
"status": "missing"
},
"probe_noise_resilience": {
"details": {
"headers": {
"content-type": "text/html; charset=iso-8859-1",
"strict-transport-security": "max-age=31536000; includeSubDomains"
},
"http_status": 404,
"url": "https://mcp.exploit-intel.com/robots.txt"
},
"latency_ms": 42.46,
"status": "ok"
},
"prompt_get": {
"details": {
"reason": "not_advertised"
},
"latency_ms": null,
"status": "missing"
},
"prompts_list": {
"details": {
"error": "Client error '400 Bad Request' for url 'https://mcp.exploit-intel.com/mcp/'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400",
"headers": {
"content-type": "application/json",
"strict-transport-security": "max-age=31536000; includeSubDomains"
},
"http_status": 400,
"payload": {},
"reason": "not_advertised",
"url": "https://mcp.exploit-intel.com/mcp"
},
"latency_ms": 84.38,
"status": "missing"
},
"protocol_version_probe": {
"details": {
"claimed_version": "2025-03-26",
"lag_days": 244,
"latest_known_version": "2025-11-25",
"releases_behind": 2,
"validator_protocol_version": "2025-03-26"
},
"latency_ms": null,
"status": "warning"
},
"provenance_divergence_probe": {
"details": {
"direct_official_match": true,
"drift_fields": [],
"metadata_document_count": 2,
"registry_homepage": null,
"registry_repository": null,
"registry_title": null,
"registry_version": null,
"server_card_homepage": null,
"server_card_repository": null,
"server_card_title": null,
"server_card_version": null
},
"latency_ms": null,
"status": "ok"
},
"request_association_probe": {
"details": {
"reason": "no_request_association_capabilities_advertised"
},
"latency_ms": null,
"status": "missing"
},
"resource_read": {
"details": {
"reason": "not_advertised"
},
"latency_ms": null,
"status": "missing"
},
"resources_list": {
"details": {
"error": "Client error '400 Bad Request' for url 'https://mcp.exploit-intel.com/mcp/'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400",
"headers": {
"content-type": "application/json",
"strict-transport-security": "max-age=31536000; includeSubDomains"
},
"http_status": 400,
"payload": {},
"reason": "not_advertised",
"url": "https://mcp.exploit-intel.com/mcp"
},
"latency_ms": 76.48,
"status": "missing"
},
"server_card": {
"details": {
"error": "Client error '404 Not Found' for url 'https://mcp.exploit-intel.com/.well-known/mcp/server-card.json'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://mcp.exploit-intel.com/.well-known/mcp/server-card.json"
},
"latency_ms": 67.94,
"status": "error"
},
"session_resume_probe": {
"details": {
"headers": {
"content-type": "text/event-stream",
"mcp-session-id": "b8ced41d588645879322b4ddc350e7e8",
"strict-transport-security": "max-age=31536000; includeSubDomains"
},
"http_status": 200,
"payload": {
"id": 301,
"jsonrpc": "2.0",
"result": {
"tools": [
{
"description": "Search the Exploit Intelligence Platform for vulnerabilities (CVEs). Returns a list of matching CVEs with CVSS scores, EPSS exploitation probability, exploit counts, CISA KEV status, VulnCheck KEV, InTheWild.io exploitation signals, and ransomware attribution. Supports full-text search, severity/vendor/product/ecosystem/CWE filters, CVSS/EPSS thresholds, plus any_exploited and ransomware filters. When sort is omitted, the API may automatically prefer newest exploitation, exploit, or nuclei-template activity based on the filters you set. Examples: query='apache httpd' with has_exploits=true; vendor='fortinet' with severity='critical' and is_kev=true sorted by epss_desc; any_exploited=true with ransomware=true for ransomware-linked CVEs; cwe='89' with min_cvss=9 for critical SQL injection CVEs.",
"inputSchema": {
"properties": {
"any_exploited": {
"description": "Only return CVEs exploited in the wild (CISA KEV + VulnCheck KEV + InTheWild.io)",
"type": "boolean"
},
"cwe": {
"description": "Filter by CWE ID (e.g. '79' or 'CWE-79')",
"type": "string"
},
"date_from": {
"description": "Start date for CVE publication (YYYY-MM-DD)",
"type": "string"
},
"date_to": {
"description": "End date for CVE publication (YYYY-MM-DD)",
"type": "string"
},
"ecosystem": {
"description": "Filter by package ecosystem",
"enum": [
"npm",
"pip",
"maven",
"go",
"crates",
"nuget",
"rubygems",
"composer"
],
"type": "string"
},
"has_exploits": {
"description": "Only return CVEs with public exploit code",
"type": "boolean"
},
"has_nuclei": {
"description": "Only return CVEs with Nuclei scanner templates",
"type": "boolean"
},
"is_kev": {
"description": "Only return CISA Known Exploited Vulnerabilities",
"type": "boolean"
},
"min_cvss": {
"description": "Minimum CVSS score (0-10)",
"type": "number"
},
"min_epss": {
"description": "Minimum EPSS score (0-1)",
"type": "number"
},
"page": {
"description": "Page number (default: 1)",
"type": "integer"
},
"per_page": {
"description": "Results per page (1-25, default: 10)",
"type": "integer"
},
"product": {
"description": "Filter by product name (e.g. 'exchange', 'pan-os')",
"type": "string"
},
"query": {
"description": "Search keywords (e.g. 'apache httpd', 'log4j'). Optional if filters are provided.",
"type": "string"
},
"ransomware": {
"description": "Only return CVEs with confirmed ransomware campaign use",
"type": "boolean"
},
"severity": {
"description": "Filter by severity level",
"enum": [
"critical",
"high",
"medium",
"low"
],
"type": "string"
},
"sort": {
"description": "Sort order. Aliases are normalized to the current server schema.",
"enum": [
"newest",
"published_newest",
"oldest",
"published_oldest",
"cvss_desc",
"epss_desc",
"relevance",
"signal_newest",
"exploit_newest",
"nuclei_newest"
],
"type": "string"
},
"vendor": {
"description": "Filter by vendor name (e.g. 'microsoft', 'fortinet')",
"type": "string"
},
"year": {
"description": "Filter by CVE year (e.g. 2024)",
"type": "integer"
}
},
"type": "object"
},
"name": "search_vulnerabilities"
},
{
"description": "Get a full intelligence brief for a specific vulnerability. Accepts both CVE-IDs (e.g. CVE-2024-3400) and EIP-IDs (e.g. EIP-2026-12345 for pre-CVE entries). Returns detailed information including CVSS score and vector, EPSS exploitation probability, CISA KEV status, description, affected products, ranked exploits (grouped by Metasploit modules, verified ExploitDB, GitHub PoCs, and trojans), Nuclei scanner templates with recon dorks, alternate identifiers, and references. Exploits are ranked by quality: Metasploit modules first (peer-reviewed), then verified ExploitDB, then GitHub by stars. Trojans are flagged at the bottom.",
"inputSchema": {
"properties": {
"cve_id": {
"description": "CVE or EIP identifier (e.g. 'CVE-2024-3400' or 'EIP-2026-12345')",
"type": "string"
}
},
"required": [
"cve_id"
],
"type": "object"
},
"name": "get_vulnerability"
},
{
"description": "Retrieve the source code of a specific exploit by its platform ID. IMPORTANT: Use the platform's internal ID shown as [id=XXXXX] in results, NOT the ExploitDB number (EDB-XXXXX). These are different numbering systems. Returns code from the exploit archive. If no file_path is specified, auto-selects the most relevant code file. Use this to analyze exploit mechanics, understand attack techniques, or review PoC code.",
"inputSchema": {
"properties": {
"exploit_id": {
"description": "Platform exploit ID (the [id=XXXXX] number from results \u2014 NOT the EDB number)",
"type": "integer"
},
"file_path": {
"description": "Relative path inside the exploit archive (optional \u2014 auto-selects if omitted). Absolute paths and traversal patterns are rejected.",
"pattern": "^(?![\\\\/])(?![A-Za-z]:[\\\\/])(?!.*\\.\\.)(?!.*~).{1,500}$",
"type": "string"
}
},
"required": [
"exploit_id"
],
"type": "object"
},
"name": "get_exploit_code"
},
{
"description": "Get the full AI analysis for a single exploit by its platform ID. Returns classification (working_poc, trojan, suspicious, scanner, stub, writeup), attack type, complexity, reliability, confidence score, authentication requirements, target software, a summary of what the exploit does, prerequisites, MITRE ATT&CK techniques, deception indicators for trojans, and the standalone backdoor-review verdict with operator-risk notes when available. Use this to check if an exploit is safe before reviewing its code. Example: exploit_id=61514 returns a TROJAN warning with deception indicators.",
"inputSchema": {
"properties": {
"exploit_id": {
"description": "Platform exploit ID (the [id=XXXXX] number from results \u2014 NOT the EDB number)",
"type": "integer"
}
},
"required": [
"exploit_id"
],
"type": "object"
},
"name": "get_exploit_analysis"
},
{
"description": "Get Nuclei scanner templates and recon dorks for a vulnerability. Returns template metadata, severity, verification status, tags, and ready-to-use Shodan, FOFA, and Google dork queries for target identification. Accepts both CVE-IDs and EIP-IDs. Use this to plan scanning or reconnaissance.",
"inputSchema": {
"properties": {
"cve_id": {
"description": "CVE or EIP identifier (e.g. 'CVE-2024-27198')",
"type": "string"
}
},
"required": [
"cve_id"
],
"type": "object"
},
"name": "get_nuclei_templates"
},
{
"description": "Get platform-wide statistics from the Exploit Intelligence Platform. Returns total counts of vulnerabilities, exploits, KEV entries, Nuclei templates, vendors, and authors, plus the last data update timestamp.",
"inputSchema": {
"properties": {},
"type": "object"
},
"name": "get_platform_stats"
},
{
"description": "Check the EIP API health and data freshness. Returns database status and timestamps for each of the 10 ingestion sources (NVD, KEV, EPSS, ExploitDB, GitHub, Metasploit, etc.).",
"inputSchema": {
"properties": {},
"type": "object"
},
"name": "check_health"
},
{
"description": "Browse and filter exploits using STRUCTURED FILTERS ONLY (no free-text query). Use this to filter by source (github, metasploit, exploitdb, nomisec, gitlab, inthewild, vulncheck_xdb), language (python, ruby, etc.), LLM classification (working_poc, trojan, suspicious, scanner, stub, writeup, tool, no_code), author, min stars, code availability, CVE ID, vendor, or product. Also filter by AI analysis: attack_type (RCE, SQLi, XSS, DoS, LPE, auth_bypass, info_leak), complexity (trivial/simple/moderate/complex), reliability (reliable/unreliable/untested/theoretical), requires_auth. NOTE: To search by product name (e.g. 'OpenSSH', 'Apache'), use search_vulnerabilities instead \u2014 it has free-text query and get_vulnerability already includes exploits in the response. Examples: source='metasploit' for all Metasploit modules; attack_type='RCE' with reliability='reliable' for weaponizable RCE exploits; cve='CVE-2024-3400' for all exploits targeting a specific CVE; vendor='mitel' for all Mitel exploits.",
"inputSchema": {
"properties": {
"attack_type": {
"description": "Filter by attack type from AI analysis: RCE, SQLi, XSS, DoS, LPE, auth_bypass, info_leak, deserialization, other",
"type": "string"
},
"author": {
"description": "Filter by author name",
"type": "string"
},
"complexity": {
"description": "Filter by exploit complexity: trivial, simple, moderate, complex",
"type": "string"
},
"cve": {
"description": "Filter by CVE ID (e.g. 'CVE-2024-3400') \u2014 returns all exploits for that CVE",
"type": "string"
},
"has_code": {
"description": "Only exploits with downloadable code",
"type": "boolean"
},
"language": {
"description": "Filter by language: python, ruby, go, c, etc.",
"type": "string"
},
"llm_classification": {
"description": "Filter by LLM classification: working_poc, trojan, suspicious, scanner, stub, writeup, tool, no_code",
"type": "string"
},
"min_stars": {
"description": "Minimum GitHub stars",
"type": "integer"
},
"page": {
"description": "Page number (default: 1)",
"type": "integer"
},
"per_page": {
"description": "Results per page (1-25, default: 10)",
"type": "integer"
},
"product": {
"description": "Filter by product name (e.g. 'micollab', 'pan-os')",
"type": "string"
},
"reliability": {
"description": "Filter by exploit reliability: reliable, unreliable, untested, theoretical",
"type": "string"
},
"requires_auth": {
"description": "Filter by whether exploit requires authentication",
"type": "boolean"
},
"sort": {
"description": "Sort order",
"enum": [
"newest",
"stars_desc"
],
"type": "string"
},
"source": {
"description": "Filter by source: github, metasploit, exploitdb, nomisec, writeup, gitlab, inthewild, vulncheck_xdb",
"type": "string"
},
"vendor": {
"description": "Filter by vendor name (e.g. 'mitel', 'fortinet') \u2014 returns exploits for all CVEs affecting that vendor",
"type": "string"
}
},
"type": "object"
},
"name": "search_exploits"
},
{
"description": "List exploit authors/researchers ranked by exploit count. Returns the top security researchers with their exploit counts and handles. Use this when asked 'who are the top exploit authors?' or 'who writes the most exploits?'",
"inputSchema": {
"properties": {
"page": {
"description": "Page number (default: 1)",
"type": "integer"
},
"per_page": {
"description": "Results per page (1-50, default: 25)",
"type": "integer"
}
},
"type": "object"
},
"name": "list_authors"
},
{
"description": "Get an exploit author's profile with all their exploits. Returns author name, handle, total exploit count, activity start date, and a paginated list of their exploits with CVE context. Use this when asked about a specific researcher like 'show me all exploits by Chocapikk'.",
"inputSchema": {
"properties": {
"author_name": {
"description": "Author name (e.g. 'Chocapikk')",
"type": "string"
}
},
"required": [
"author_name"
],
"type": "object"
},
"name": "get_author"
},
{
"description": "List CWE (Common Weakness Enumeration) categories ranked by vulnerability count. Returns CWE IDs, names, short labels, exploit likelihood, and how many CVEs have that weakness. Use this when asked 'what are the most common vulnerability types?'",
"inputSchema": {
"properties": {},
"type": "object"
},
"name": "list_cwes"
},
{
"description": "Get details for a specific CWE including full name, description, exploit likelihood, parent CWE, and total vulnerability count. Example: cwe_id='CWE-79' returns details about Cross-Site Scripting.",
"inputSchema": {
"properties": {
"cwe_id": {
"description": "CWE identifier (e.g. 'CWE-79' or '79')",
"type": "string"
}
},
"required": [
"cwe_id"
],
"type": "object"
},
"name": "get_cwe"
},
{
"description": "List software vendors ranked by vulnerability count. Returns the top 200 vendors with their total CVE counts. Use this when asked 'which vendors have the most vulnerabilities?' or to understand the threat landscape by vendor.",
"inputSchema": {
"properties": {},
"type": "object"
},
"name": "list_vendors"
},
{
"description": "List products for a specific vendor with vulnerability counts. Use this to discover exact product names for filtering. Product names in the database use CPE conventions (e.g. 'exchange_server' not 'exchange', 'windows_10' not 'windows 10'). Example: vendor='microsoft' returns products like exchange_server, windows_10, office, edge_chromium.",
"inputSchema": {
"properties": {
"vendor": {
"description": "Vendor name (e.g. 'microsoft', 'apache', 'fortinet')",
"type": "string"
}
},
"required": [
"vendor"
],
"type": "object"
},
"name": "list_products"
},
{
"description": "Look up a vulnerability by an alternate identifier such as an ExploitDB ID (EDB-XXXXX) or GitHub Security Advisory ID (GHSA-XXXXX). Returns the matching CVE-ID with basic severity info. Use this when you have an EDB number or GHSA ID and need to find the corresponding CVE.",
"inputSchema": {
"properties": {
"alt_id": {
"description": "Alternate ID (e.g. 'EDB-48537', 'GHSA-jfh8-c2jp-5v3q')",
"type": "string"
}
},
"required": [
"alt_id"
],
"type": "object"
},
"name": "lookup_alt_id"
},
{
"description": "Audit a technology stack for exploitable vulnerabilities. Accepts a comma-separated list of technologies (max 5) and searches for critical/ high severity CVEs with public exploits for each one, sorted by EPSS exploitation probability. Use this when a user describes their infrastructure and wants to know what to patch first. Example: technologies='nginx, postgresql, node.js' returns a risk-sorted list of exploitable CVEs grouped by technology. Rate-limit cost: each technology requires up to 2 API calls; 5 technologies counts as up to 10 calls toward your rate limit.",
"inputSchema": {
"properties": {
"technologies": {
"description": "Comma-separated list of technologies (e.g. 'nginx, postgresql, node.js'). Max 5.",
"type": "string"
}
},
"required": [
"technologies"
],
"type": "object"
},
"name": "audit_stack"
},
{
"description": "Generate a pentest report finding in Markdown format for a specific vulnerability. Fetches full detail and formats it as a professional finding with severity, CVSS, description, affected products, exploit availability, and references. Accepts both CVE-IDs and EIP-IDs. Optionally include the target system tested and tester notes. The output is ready to paste into a pentest report. Example: cve_id='CVE-2024-3400', target='fw.corp.example.com', notes='Confirmed RCE via GlobalProtect gateway'.",
"inputSchema": {
"properties": {
"cve_id": {
"description": "CVE or EIP identifier (e.g. 'CVE-2024-3400')",
"type": "string"
},
"notes": {
"description": "Tester notes to include in the finding. Optional.",
"type": "string"
},
"target": {
"description": "Target system tested (e.g. 'fw.corp.example.com'). Optional.",
"type": "string"
}
},
"required": [
"cve_id"
],
"type": "object"
},
"name": "generate_finding"
}
]
}
},
"requested_protocol_version": "2025-03-26",
"resumed": true,
"session_id_present": true,
"transport": "streamable-http",
"url": "https://mcp.exploit-intel.com/mcp"
},
"latency_ms": 60.58,
"status": "ok"
},
"step_up_auth_probe": {
"details": {
"auth_required_checks": [],
"broad_scopes": [],
"challenge_headers": [],
"minimal_scope_documented": false,
"oauth_present": false,
"scope_specificity_ratio": 0.0,
"step_up_signals": [],
"supported_scopes": []
},
"latency_ms": null,
"status": "missing"
},
"tool_snapshot_probe": {
"details": {
"reason": "no_tools"
},
"latency_ms": null,
"status": "missing"
},
"tools_list": {
"details": {
"error": "Client error '400 Bad Request' for url 'https://mcp.exploit-intel.com/mcp/'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400",
"headers": {
"content-type": "application/json",
"strict-transport-security": "max-age=31536000; includeSubDomains"
},
"http_status": 400,
"payload": {},
"url": "https://mcp.exploit-intel.com/mcp"
},
"latency_ms": 71.16,
"status": "error"
},
"transport_compliance_probe": {
"details": {
"bad_protocol_error": null,
"bad_protocol_headers": {
"content-type": "application/json",
"strict-transport-security": "max-age=31536000; includeSubDomains"
},
"bad_protocol_payload": {
"error": {
"code": -32700,
"message": "Invalid request"
},
"id": null,
"jsonrpc": "2.0"
},
"bad_protocol_status_code": 400,
"delete_error": null,
"delete_status_code": 200,
"expired_session_error": null,
"expired_session_status_code": 404,
"issues": [
"missing_protocol_header"
],
"last_event_id_visible": false,
"protocol_header_present": false,
"requested_protocol_version": "2025-03-26",
"session_id_present": true,
"transport": "streamable-http"
},
"latency_ms": 103.55,
"status": "warning"
},
"utility_coverage_probe": {
"details": {
"completions": {
"advertised": false,
"live_probe": "not_executed",
"sample_target": null
},
"initialize_capability_keys": [
"experimental",
"prompts",
"tools"
],
"pagination": {
"metadata_signal": false,
"next_cursor_methods": [],
"supported": false
},
"tasks": {
"advertised": false,
"http_status": 400,
"probe_status": "missing"
}
},
"latency_ms": 49.32,
"status": "missing"
}
},
"failures": {
"oauth_authorization_server": {
"reason": "no_authorization_server"
},
"oauth_protected_resource": {
"error": "Client error '404 Not Found' for url 'https://mcp.exploit-intel.com/.well-known/oauth-protected-resource'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://mcp.exploit-intel.com/.well-known/oauth-protected-resource"
},
"openid_configuration": {
"reason": "no_authorization_server"
},
"server_card": {
"error": "Client error '404 Not Found' for url 'https://mcp.exploit-intel.com/.well-known/mcp/server-card.json'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://mcp.exploit-intel.com/.well-known/mcp/server-card.json"
},
"tools_list": {
"error": "Client error '400 Bad Request' for url 'https://mcp.exploit-intel.com/mcp/'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400",
"headers": {
"content-type": "application/json",
"strict-transport-security": "max-age=31536000; includeSubDomains"
},
"http_status": 400,
"payload": {},
"url": "https://mcp.exploit-intel.com/mcp"
}
},
"remote_url": "https://mcp.exploit-intel.com/mcp",
"server_card_payload": null,
"server_identifier": "com.exploit-intel/eip-mcp"
}
Known versions
0.3.9
Validation history
7 day score delta
+0.0
30 day score delta
+0.1
Recent healthy ratio
0%
Freshness
598.2h
| Timestamp | Status | Score | Latency | Tools |
|---|---|---|---|---|
| Apr 09, 2026 08:33:27 AM UTC | Failing | 58.0 | 959.2 ms | 0 |
| Apr 09, 2026 12:32:28 AM UTC | Failing | 58.0 | 1065.1 ms | 0 |
| Apr 08, 2026 04:31:46 PM UTC | Failing | 58.0 | 993.1 ms | 0 |
| Apr 08, 2026 08:31:25 AM UTC | Failing | 58.0 | 779.0 ms | 0 |
| Apr 08, 2026 12:30:50 AM UTC | Failing | 58.0 | 1329.9 ms | 0 |
| Apr 07, 2026 04:30:18 PM UTC | Failing | 58.0 | 998.5 ms | 0 |
| Apr 07, 2026 08:30:08 AM UTC | Failing | 58.0 | 846.0 ms | 0 |
| Apr 07, 2026 12:29:50 AM UTC | Failing | 58.0 | 944.6 ms | 0 |
Validation timeline
| Validated | Summary | Score | Protocol | Auth mode | Tools | High-risk tools | Changes |
|---|---|---|---|---|---|---|---|
| Apr 09, 2026 08:33:27 AM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 09, 2026 12:32:28 AM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 08, 2026 04:31:46 PM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 08, 2026 08:31:25 AM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 08, 2026 12:30:50 AM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 07, 2026 04:30:18 PM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 07, 2026 08:30:08 AM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 07, 2026 12:29:50 AM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 06, 2026 04:27:34 PM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 06, 2026 08:26:31 AM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 06, 2026 12:25:26 AM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
| Apr 05, 2026 04:24:35 PM UTC | Failing | 58.0 | 2025-03-26 | public | 0 | 0 | none |
Recent validation runs
| Started | Status | Summary | Latency | Checks |
|---|---|---|---|---|
| Apr 09, 2026 08:33:26 AM UTC | Completed | Failing | 959.2 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 09, 2026 12:32:27 AM UTC | Completed | Failing | 1065.1 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 08, 2026 04:31:45 PM UTC | Completed | Failing | 993.1 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 08, 2026 08:31:24 AM UTC | Completed | Failing | 779.0 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 08, 2026 12:30:49 AM UTC | Completed | Failing | 1329.9 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 07, 2026 04:30:17 PM UTC | Completed | Failing | 998.5 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 07, 2026 08:30:07 AM UTC | Completed | Failing | 846.0 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 07, 2026 12:29:49 AM UTC | Completed | Failing | 944.6 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 06, 2026 04:27:33 PM UTC | Completed | Failing | 1062.3 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| Apr 06, 2026 08:26:30 AM UTC | Completed | Failing | 716.0 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |