Real-time CVE, exploit, and vulnerability intelligence for AI assistants (350K+ CVEs, 115K+ PoCs)
Use this profile to copy client config, check auth requirements, review tools and resources, and compare related MCP servers before adding it to an AI client.
https://mcp.exploit-intel.com/mcpuvx eip-mcp{
"EIP_API_KEY": "YOUR_SECRET_VALUE"
}Add this server entry to the mcpServers object in your Claude Desktop config, then restart the app.
{
"mcpServers": {
"com-exploit-intel-eip-mcp": {
"command": "uvx",
"args": [
"eip-mcp"
],
"env": {
"EIP_API_KEY": "YOUR_SECRET_VALUE"
}
}
}
}~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNo remote HTTP endpoint is advertised. Use the package or stdio setup shown in Install.
Exploit Intelligence Platform — CVE, Vulnerability and Exploit Database is an MCP server for Real-time CVE, exploit, and vulnerability intelligence for AI assistants (350K+ CVEs, 115K+ PoCs). It supports STDIO, HTTP transport.
Use the generated config in Install. This server runs with uvx eip-mcp; add any required environment variables before starting your client.
Choose the Claude Desktop tab in Install, copy the config, and add it to Claude Desktop's MCP server settings. Endpoint: https://mcp.exploit-intel.com/mcp.
Choose the Claude Code tab in Install, copy the config, and add it to Claude Code's MCP server settings. Endpoint: https://mcp.exploit-intel.com/mcp.
Choose the Codex tab in Install, copy the config, and add it to Codex's MCP server settings. Endpoint: https://mcp.exploit-intel.com/mcp.
Choose the Cursor or VS Code tab in Install, copy the config, and add it to Cursor or VS Code's MCP server settings. Endpoint: https://mcp.exploit-intel.com/mcp.
Exploit Intelligence Platform — CVE, Vulnerability and Exploit Database uses STDIO, HTTP transport. Endpoint: https://mcp.exploit-intel.com/mcp.
Exploit Intelligence Platform — CVE, Vulnerability and Exploit Database inventory is listed when the MCP endpoint exposes tools, resources, or prompts. Some servers require auth first.
Exploit Intelligence Platform — CVE, Vulnerability and Exploit Database does not advertise a verified auth requirement. If discovery fails, it may still need provider login, an API key, a bearer token, or a session header.
| Package | Registry | Version | Inputs |
|---|---|---|---|
eip-mcpstdio | pypi | 0.3.9 | Env: EIP_API_KEY secret |