Trivy Security Scanner MCP Server
A Model Context Protocol (MCP) server that provides Trivy security scanning capabilities through a standardized interface.
⚠️ Note: This is a proof of concept project to demonstrate the integration capabilities between MCP, Cursor IDE, and Trivy. It’s intended for experimentation and learning purposes only and is not production-ready. Use at your own risk.
Features
- 🔍 Project Scanning: Automatically scan your project directory for security vulnerabilities using Trivy
- 🛠️ Automated Fixes: Automatically update vulnerable dependencies to secure versions
- 📦 Multi-Package Support: Handles multiple package managers (Python, Node.js, Ruby, Go)
Demo

Architecture
┌─────────────┐ ┌──────────────┐ ┌─────────────┐
│ Cursor IDE │ --> │ MCP Server │ --> │ Trivy │
│ (Composer) │ │ │ │ │
└─────────────┘ └──────────────┘ └─────────────┘
Prerequisites
- Python 3.12 or higher
- Trivy installed on your system:
# macOS brew install trivy
Installation
# Create and activate virtual environment
python -m venv .venv
source .venv/bin/activate
# Install dependencies
pip install -r requirements.txt
Usage
Start the server using SSE transport:
# Using SSE transport (default)
python server.py --transport sse --port 54321
The server exposes two tools:
scan_project: Scans a directory for security vulnerabilities- Required argument:
workspace- The directory path to scan
- Required argument:
fix_vulnerability: Updates a vulnerable package to a secure version- Required arguments:
workspace- The directory to modifypkg_name- Name of the package to updatetarget_version- Version to update to
- Required arguments:
Using with Cursor IDE
Start the server with SSE transport:
python server.py --transport sse --port 54321Configure in Cursor:
- Open Settings
- Go to Features > MCP Servers
- Add:
http://127.0.0.1:54321/sse
Add the following to your .cursorrules file, create it if you don’t have one yet:
After making changes in any of the package dependency/manifest files, scan the project for security vulnerabilities. Fixes should only be according to the desired version reported by the scanner. If the scanner reports a fix unrelated to our change, ignore it. After performing the fix, scan the project for security vulnerabilities again.This configuration will:
- Automatically trigger a security scan when any dependency file is modified
- Help identify vulnerabilities as soon as new dependencies are added
- Ensure your project stays secure throughout development
if you want to use the tool manually, you can use prompt the agent to use the tool with the following prompt through the composer interface:
Please scan my project for security vulnerabilities
Why MCP?
MCP (Model Context Protocol) exists to solve a fundamental problem in working with large language models (LLMs): how to efficiently and consistently connect these models to external data sources and tools.
Learn more at modelcontextprotocol.io.
Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
License
MIT License
Acknowledgments
- Model Context Protocol
- Trivy
- Cursor IDE
Trivy Security Scanner
Project Details
- norbinsh/cursor-mcp-trivy
- MIT License
- Last Updated: 4/14/2025
Categories
Recomended MCP Servers
A Model Context Protocol implementation for FHIR
Lightweight MCP server to give your Cursor Agent access to the Vercel API.
A Model Context Protocol (MCP) server for interacting with Meilisearch through LLM interfaces.
This MCP server provides browser automation capabilities through Puppeteer, allowing interaction with both new browser instances and existing...
This is an MCP (Model Context Protocol) Server for discovering and downloading 3D models
A Model Context Protocol (MCP) server that enables AI assistants to interact with HubSpot CRM data, providing built-in...
A Model Context Protocol server allows Clients to interact with Xero
AI Agents & MCPs & AI Workflow Automation • (280+ MCP servers for AI agents) • AI Automation...
MCP Server for Alpha Advantage API
MCP server for DuckDB and MotherDuck





