Anchore MCP server for Grype vulnerability scanner
Integrate Grype vulnerability scanning directly into AI-assisted development workflows through the Model Context Protocol (MCP).
Install using uvx (recommended):
uvx grype-mcpOr using pipx:
pipx install grype-mcpOr using pip:
pip install grype-mcpAdd to your Claude Desktop configuration:
{
"mcpServers": {
"grype": {
"command": "uvx",
"args": ["grype-mcp"]
}
}
}For other MCP-compatible clients, add the server using:
- Command:
uvx - Args:
["grype-mcp"]
Start using Grype's vulnerability scanning capabilities!
The Grype MCP server provides these tools for AI assistants:
find_grype- Check if Grype is installed and get version infoupdate_grype- Install or update Grype to the latest versionget_db_info- Get vulnerability database status and version infoupdate_db- Update the vulnerability database
scan_dir- Scan project directories for vulnerabilitiesscan_purl- Scan specific packages using PURL format (e.g.,pkg:npm/lodash@4.17.20)scan_image- Scan container images for vulnerabilities
search_vulns- Search the vulnerability database by CVE, package name, or CPEget_vuln_details- Get detailed information about specific CVEs
Once configured, you can ask:
- "Check if Grype is installed and up to date"
- "Scan my project directory for vulnerabilities"
- "Is pkg:npm/lodash@4.17.20 vulnerable?"
- "Scan the nginx:latest Docker image"
- "Search for Log4j vulnerabilities"
- "Get details about CVE-2021-44228"
- Python 3.10+
- Grype (can be installed via the
update_grypetool) - Docker (optional, for container image scanning)
The MCP server can help install Grype if it's not already available using the update_grype tool.
- Directories - Scan entire projects with all their dependencies
- Container Images - Docker images from any registry
- Package URLs - Individual packages in PURL format
- npm:
pkg:npm/package@version - Python:
pkg:pypi/package@version - Go:
pkg:golang/package@version - Java:
pkg:maven/group/artifact@version - And many more ecosystems
- npm:
The MCP server acts as a bridge between AI assistants and Grype:
AI Assistant β MCP Server β Grype CLI β Vulnerability Database
- Zero modifications to Grype required
- Structured JSON responses optimized for AI consumption
- Comprehensive error handling with helpful messages
- Automatic tool management for easy setup
We welcome contributions! Please see:
- CONTRIBUTING.md - Contribution guidelines
- DEVELOPING.md - Development setup
- CODE_OF_CONDUCT.md - Community standards
Licensed under the Apache License, Version 2.0. See LICENSE for details.
- Grype - Vulnerability scanner for container images and filesystems
- Syft - SBOM generation tool
- Model Context Protocol - Open protocol for AI assistant integrations
- Anchore Enterprise - Commercial SBOM-powered security platform
- GitHub Issues - Bug reports and feature requests
- Anchore Community Discourse - Community support and discussions
- Documentation - Full documentation
Made with β€οΈ by the Anchore team for the AI-assisted development community