Model Context Protocol (MCP)
Early Access
Try our newest feature! Only available through reach out. Contact us to join the early access program and get priority support.
Unizo offers an MCP server that integrates vulnerability management platforms with any LLM provider supporting the MCP protocol. This enables your AI agent to analyze vulnerabilities, prioritize remediation, and automate security workflows across Qualys, Tenable, Rapid7, and other vulnerability management solutions via a single MCP server.
Supported Tools & Use Cases
The following tools are available in the Vulnerability Management MCP Server:
Tool Name | Description |
---|---|
list_vulnerabilities | Browse vulnerabilities with advanced filtering and search capabilities |
get_vulnerability_details | Retrieve comprehensive vulnerability information including technical details and remediation guidance |
list_assets | View scanned assets with their vulnerability status and metadata |
get_asset_vulnerabilities | Check all vulnerabilities for specific assets with detailed context |
analyze_risk | Calculate risk scores and prioritize remediation based on multiple factors |
track_remediation | Monitor patching progress and remediation effectiveness |
list_vulnerabilities
Browse vulnerabilities with advanced filtering and search capabilities
Parameters:
integration
: Target vulnerability management platform (required)severity
: Filter by severity level (critical, high, medium, low)status
: Filter by vulnerability status (active, mitigated, false_positive)asset_tags
: Filter by asset tags or groupscve_ids
: Search for specific CVEspublished_after
: Filter by publication dateexploitability
: Filter by exploit availabilitypage
: Pagination controllimit
: Number of results per page
get_vulnerability_details
Retrieve comprehensive vulnerability information including technical details and remediation guidance
Parameters:
integration
: Target vulnerability management platform (required)vulnerability_id
: Unique vulnerability identifier (required)include_affected_assets
: Include list of affected assetsinclude_remediation
: Include detailed remediation stepsinclude_exploit_info
: Include exploit availability and detailsinclude_references
: Include CVE references and links
list_assets
View scanned assets with their vulnerability status and metadata
Parameters:
integration
: Target vulnerability management platform (required)asset_type
: Filter by asset type (server, workstation, network_device)os_family
: Filter by operating system familycriticality
: Filter by asset criticality (critical, high, medium, low)last_scan
: Filter by last scan datevulnerability_count
: Filter by number of vulnerabilitiestags
: Filter by asset tagspage
: Pagination controllimit
: Number of results per page
get_asset_vulnerabilities
Check all vulnerabilities for specific assets with detailed context
Parameters:
integration
: Target vulnerability management platform (required)asset_id
: Target asset identifier (required)severity_filter
: Filter by severity levelsinclude_mitigated
: Include mitigated vulnerabilitiesinclude_dependencies
: Include dependency vulnerabilitiessort_by
: Sort results (severity, published_date, cvss_score)
analyze_risk
Calculate risk scores and prioritize remediation based on multiple factors
Parameters:
integration
: Target vulnerability management platform (required)vulnerabilities
: List of vulnerabilities to analyze (required)factors
: Risk factors to consider (exploitability, asset_criticality, exposure)business_context
: Additional business context for scoringthreat_intelligence
: Include threat intel correlationcompliance_frameworks
: Consider compliance requirements
track_remediation
Monitor patching progress and remediation effectiveness
Parameters:
integration
: Target vulnerability management platform (required)remediation_id
: Remediation campaign identifierassets
: Assets to track remediation fortime_range
: Time period for trackinginclude_validation
: Include post-patch validation resultsmetrics
: Specific metrics to track (mttr, success_rate, coverage)
Installation
Prerequisites
- A Unizo API key
- An active VMS integration (Black Duck SCA, Checkmarx, Coverity Static, Qualys, Rapid7 InsightVM, Semgrep, Tenable Nessus, Veracode)
- Node.js v20 or higher
MCP Configuration
Here is an example configuration for setting up the Unizo Vulnerability Management MCP server:
{
"mcpServers": {
"unizo-vms": {
"command": "npx",
"args": [
"mcp-remote",
"http://api.unizo.ai/mcp/vms",
"--allow-http",
"--header",
"apikey:${UNIZO_API_KEY}"
],
"env": {
"UNIZO_API_KEY": "your_api_key"
}
}
}
}
Client Setup
For detailed setup instructions with specific AI clients:
Environment Variables
The following environment variables are required:
UNIZO_API_KEY
: Your Unizo API key Your Unizo API key
Error Handling
All tools return errors in a consistent format:
{
"error": {
"code": "VULNERABILITY_NOT_FOUND",
"message": "CVE-2024-12345 not found in current integration"
}
}
Common error codes:
INTEGRATION_NOT_FOUND
: Invalid integration IDVULNERABILITY_NOT_FOUND
: Vulnerability ID does not existASSET_NOT_FOUND
: The asset ID is invalid or not availableREMEDIATION_NOT_FOUND
: Remediation tracking not foundRATE_LIMIT_EXCEEDED
: API rate limit reachedUNAUTHORIZED
: Invalid API key or insufficient permissions