ZeroDayDB

SearchRecentAnalyticsWriteupsAPICLIMCP

ZeroDayDB MCP

FREE

Connect AI clients to ZeroDayDB through a local MCP server backed by the same vulnerability API used by the web app and CLI.

Included at No Extra Cost

The MCP server ships as a Python workspace package. Run it locally over stdio by default, or expose an SSE endpoint with --http when a client needs HTTP transport.

Run from the Workspace

Start the stdio server directly from a local ZeroDayDB checkout.

uv run --project apps/mcp zerodaydb-mcp

Optional SSE Mode

Launch an HTTP SSE endpoint for clients that prefer network transport.

uv run --project apps/mcp zerodaydb-mcp --http --port 8100

Features

Search vulnerabilities by text
Query ZeroDayDB with optional severity filters from your AI client.
Lookup CVEs by identifier
Fetch full vulnerability details for a CVE or ZeroDayDB record ID.
Check package versions
Use OSV-backed package matching with ecosystem, package name, and version.
List recent disclosures
Pull the latest findings, optionally filtered by severity.
Fetch analytics snapshots
Read platform analytics for periods such as 30d.
Use stdio or SSE
Run locally over stdio or switch to SSE with the built-in HTTP flag.

Setup Guide

1

Start the server locally

From a local ZeroDayDB checkout, launch the stdio server with the workspace command.

uv run --project apps/mcp zerodaydb-mcp
2

Set optional environment variables

Only add these when you need authenticated access or want the server to talk to a self-hosted API.

export ZERODAYDB_API_KEY=your_api_key
export ZERODAYDB_API_URL=https://0d.ayden.gg
3

Configure your AI assistant

Point your client at the workspace package. Example Claude Desktop entry:

{
  "mcpServers": {
    "zerodaydb": {
      "command": "uv",
      "args": [
        "run",
        "--project",
        "/path/to/zerodaydb/apps/mcp",
        "zerodaydb-mcp"
      ],
      "env": {
        "ZERODAYDB_API_KEY": "optional_api_key"
      }
    }
  }
}
4

Start using the tools

Restart your client and call tools like get_cve, search_vulnerability, check_package, list_recent, and get_analytics.

Example Queries

Once configured, ask questions that map directly to the tools the server exposes.

Q

"Find CVE-2024-3094 and summarize the impact."

Q

"Check whether lodash 4.17.20 is vulnerable in npm."

Q

"List the latest high-severity disclosures."

Q

"Show me ZeroDayDB analytics for the last 30 days."

Supported AI Assistants

Claude Desktop

Configure the stdio command shown above in your Claude Desktop MCP settings.

Cline (VS Code)

Use the same workspace-backed stdio command inside your VS Code MCP configuration.

Custom MCP Clients

Run over stdio by default or start SSE mode with --http.

ZeroDayDB

A comprehensive database of zero-day vulnerabilities and security research.

Navigate

  • Search
  • Recent
  • Analytics
  • Writeups
  • API
  • MCP
  • CLI

Resources

  • Ingestion Pipeline
  • Report an Issue
  • About

Legal

  • Code of Ethics
  • Terms of Service
  • Privacy Policy

© 2026 ZeroDayDB. All rights reserved.

Built with care for the security community