2,500+ MCP servers ready to use
Vinkius
MCP VERIFIED · PRODUCTION READY · VINKIUS GUARANTEED
Checkmarx
Snyk
Contrast Security
NIST NVD
Tenable
Have I Been Pwned
24 apps

Vulnerability Scanning

The best Vulnerability Scanning connectors for your AI agents.

Contrast Security

Contrast Security

10 tools

Equip your AI with Contrast Security AppSec data to monitor applications and hunt critical vulnerabilities directly via chat.

NIST NVD

NIST NVD

10 tools

Access authoritative vulnerability and product data via NIST NVD — track CVEs, CPEs, and security history directly from your AI agent.

Tenable

Tenable

10 tools

Manage Tenable Vulnerability Management scans, inspect cloud assets, and triage CVEs natively via your AI agent.

Have I Been Pwned

Have I Been Pwned

5 tools

Check if your accounts or passwords have been compromised in data breaches using the HIBP service.

Aikido Security

Aikido Security

16 tools

Query security vulnerabilities via Aikido — list open issues, check repositories, monitor cloud assets, and track compliance directly from any AI agent.

HCL AppScan

HCL AppScan

10 tools

Manage security scans and vulnerabilities with HCL AppScan — track issues and audit applications via AI.

HackerOne

HackerOne

10 tools

Automate bug bounty management via HackerOne — manage reports, programs, and payments directly from any AI agent.

Rapid7 InsightVM

Rapid7 InsightVM

10 tools

Equip your AI to interact directly with Rapid7 InsightVM, extracting vulnerability assessments, scanning network assets, and launching immediate scans.

Salt Security

Salt Security

10 tools

Integrate Salt Security directly with your AI for comprehensive API threat vector discovery, posture management, and active remediation in real-time.

Veracode

Veracode

10 tools

Bring Veracode AppSec to your AI. Analyze source code flaws, extract application profiles, and track vulnerabilities conversationaly.

AbuseIPDB

AbuseIPDB

4 tools

Audit IP addresses — check abuse scores and reports via AI.

Censys

Censys

9 tools

Search internet-connected hosts, SSL certificates and attack surface — discover exposed services and vulnerabilities.

Patchstack Security

Patchstack Security

9 tools

Monitor WordPress security via Patchstack — track vulnerabilities, manage site software, and receive alerts directly via AI.

Shodan

Shodan

10 tools

Search for internet-connected devices, analyze open ports, discover vulnerabilities and explore the IoT landscape.

Acunetix 360

Acunetix 360

3 tools

Automated web vulnerability scanning — manage scans, track issues, and audit security via AI.

Beagle Security

Beagle Security

10 tools

Automate security testing via Beagle Security — list projects, start tests, and retrieve results directly from any AI agent.

Bugcrowd

Bugcrowd

10 tools

Manage crowdsourced security via Bugcrowd — track submissions, programs, and targets directly from any AI agent.

Equixly

Equixly

10 tools

Automate API security testing via Equixly — manage target services, trigger autonomous AI pentests, and audit vulnerability findings directly from any AI agent.

StackHawk

StackHawk

10 tools

Connect your AI to the StackHawk DAST platform. Run automated security scans, triage alerts seamlessly, and find vulnerabilities effortlessly.

Wallarm

Wallarm

10 tools

Monitor API security, detect attacks, and manage WAF vulnerabilities on Wallarm — the end-to-end API security platform.

Halo Security

Halo Security

11 tools

Automate attack surface management via Halo Security — monitor assets, scans, and vulnerabilities directly from any AI agent.

Intruder

Intruder

10 tools

Automate vulnerability scanning and security monitoring via Intruder.io API.