Cybe MCP · Model Context Protocol

The whole CybeDefend platform, in your agent's tool list.

20+ tools, one MCP server. The agent reads, updates and comments on every finding, surfaces similar issues, and pulls project-specific rules from Cybe before generating a single line of code.

Connects to
  • Claude Code
  • Cursor
  • Windsurf
  • Visual Studio Code
  • JetBrains
  • GitHub
  • Google Gemini
cybe-mcpstdio · 20+ tools
MCP · live
read · 6 scanners · branch + severity filtersupdate · status · priority · comment · auditcontext · Cybe business-logic rules
  1. list_vulnerabilities_sastREAD
    3 critical with code snippets returned
  2. update_vulnerabilityUPDATE
    v_8a3b marked resolved · audit trail saved
  3. get_business_logic_contextCONTEXT
    7 project rules retrieved
  4. get_similar_vulnerabilitiesSIMILAR
    4 matching SQLi cases queued for batch fix
patch ready · agent applied secure-by-default

Security findings used to live in a dashboard nobody opened.

The agent now opens it on every prompt and acts on what it sees.

Every CVE on your roadmap is one chat message from being closed.

Capabilities

Three capability surfaces, one MCP server.

The MCP doesn't replace your scanners, it gives the agent the same view your security team works from, plus the write access to act on it, plus the project-specific context to write secure code from the start.

01 / 03
01 · READ

Every finding, every scanner, every branch

Paginated lists with rich filters (severity, status, priority, language, branch, packageType) plus the full record per finding, snippet, file, line, package tree, remediation hint. One consistent shape across every scanner so the agent reads what your security team reads, in the same call.

02 / 03
02 · UPDATE

Drive the full lifecycle on every finding

To verify → Confirmed → Resolved · Not exploitable · Proposed not exploitable · Ignored. Update priority, attach a comment, find a similar batch with one call and apply the same status to the lot. Every action lands in the audit trail signed by the agent.

03 / 03
03 · MINE

Project-specific business-logic context, on demand

Before the agent writes a payment endpoint or auth flow, it asks for the rules your project enforces. Cybe crawls the repo, builds a code knowledge graph and extracts tenant scope, refund caps, idempotency keys and audit-trail conventions, shipped back as a system prompt the agent inlines before writing the diff.

Flow

What happens between the prompt and the patch.

Every Cybe tool call follows the same three-step path. The agent doesn't orchestrate, it asks, the MCP routes, the answer lands in context.

STEP 01

Agent calls a Cybe tool

The agent picks the right tool from the 18 we expose, each with a typed schema its planner can reason about. Filters and projectId default from the environment so prompts stay terse.

STEP 02

Cybe MCP routes to the right service

Vulnerability calls hit the platform's REST API behind a refreshing PAT exchange. Business-logic calls hit Cybe, which spins up an incremental knowledge-graph crawl scoped to the requested branch. Region pinning (EU or US) is enforced at the boundary.

STEP 03

Result lands back in the agent's context

Findings return with the location data the agent needs to patch in place. Status updates echo back the audit-trail entry. Business-logic responses arrive as a structured system prompt, ready to inline before code generation.

Business-logic context

Without MCP the agent guesses, with MCP it has the rules of your codebase.

Two views of the same prompt, "add a payment endpoint". On the left, what a generic AI assistant produces with no project context. On the right, what the same agent produces after one call to get_business_logic_context.

Generic agent, no MCP
function refund(orderId, amount) {
  if (req.user.id === order.userId) {
    db.orders.refund(orderId, amount);
  }
}

Boilerplate Express handler. Hardcoded amount, no idempotency key, no audit log, no tenant scope. Lints clean, passes basic tests, ships a tenant cross-talk + double-charge bug to staging.

syntax: clean
Same agent + Cybe MCP
async function refund(orderId, amount, req) {
  const key = req.headers['idempotency-key'];
  if (!key) return res.status(400).end();

  const order = await db.orders.findById(orderId, {
    where: { companyId: req.companyId },
  });
  if (!order) return res.status(404).end();

  const cap = await stripe.refunds.create({
    payment_intent: order.intent,
    amount,
  });
  await audit.log({
    actor: req.user.id,
    amount,
    captureId: cap.id,
  });
  return res.json({ ok: true });
}

Cybe returned three project rules: scope every payment by req.companyId, require an Idempotency-Key header, log the operator + amount + capture-id to the audit table. The agent inlines them before writing the handler, the first draft already meets the policy.

  • tenant-isolation · scope every payment read/write by req.companyId
  • idempotency · require Idempotency-Key header on POST /payments
  • audit-trail · log operator + amount + captureId on every refund
Tool catalogue

Six scanners, two tools each, one MCP envelope.

Each scanner exposes a list_… tool to walk through findings and a get_… tool to drill into a single record. SCA adds list_sca_packages for the dependency tree.

SAST · list_vulnerabilities_sast · get_vulnerability_sast

Reachability-aware static analysis findings, filterable by severity, status, priority, language, branch. Each record returns the code snippet around the taint sink so the agent can patch on the spot.

Learn more

SCA · list_vulnerabilities_sca · get_vulnerability_sca · list_sca_packages

Vulnerable open-source dependencies plus the full package tree. Each finding returns the affected package, the call path, and the suggested bump version, fuel for an auto-bump PR.

Learn more

IaC · list_vulnerabilities_iac · get_vulnerability_iac

Terraform, Pulumi, CDK, Kubernetes, Ansible and CloudFormation misconfigurations, each tied back to the file and resource block that produced them. The agent rewrites the block in place.

Learn more

Container · list_vulnerabilities_container · get_vulnerability_container

Image findings with the AI-triaged context: which CVEs are exposed in your base layers, which application dependencies need a bump, which Dockerfile change clears a class of findings at once. The agent picks the right base-image bump or Dockerfile rewrite without guessing severity.

Learn more

Secrets · list_vulnerabilities_secret · get_vulnerability_secret

Leaked tokens with provider type, location, validation status. The agent rotates and references via a vault placeholder before re-running the scan to confirm the leak is closed.

Learn more

CI/CD · list_vulnerabilities_cicd · get_vulnerability_cicd

Pipeline misconfigurations across GitHub Actions, GitLab CI, Jenkins, CircleCI, Bitbucket and Azure DevOps. The agent fixes the workflow file directly and watches the gate go green.

Learn more
Privacy by design

Tenant-isolated runtime, EU + US residency, no training on your code.

Cybe MCP is a thin wrapper around CybeDefend's REST surface, your repo never moves, your model weights stay frozen, and every call carries the agent's identity into the audit trail.

EU + US data residency

Pick the region for both the MCP runtime and the platform backend with REGION or API_BASE. The default is single-region pinning; cross-region traffic only happens when you explicitly opt in. SOC 2 Type II controls are enforced on either side.

No training on customer code

Model weights are frozen for inference only. We don't fine-tune, RLHF or evaluate on your repos, the contract you sign reflects this and the audit log proves it. Cybe's knowledge graph is per-tenant and ephemeral.

Zero-storage, agent-identified calls

The MCP itself stores nothing, every call is a thin REST request that streams the answer back to the agent. The PAT-to-Bearer exchange happens inline; the agent's identity and timestamps land in the platform's audit trail for every read or write.

FAQ

Common questions before turning the MCP on.

What can the agent actually do via Cybe MCP?

Read every finding across SAST · SCA · IaC · CI/CD · Secrets · Container with full filters (severity, status, priority, language, branch, packageType). Drive the full status lifecycle: To verify → Confirmed → Resolved · Not exploitable · Proposed not exploitable · Ignored. Update priority, leave comments, find similar findings, walk the dependency tree, get a project overview. And on top of that, fetch project-specific business-logic rules from Cybe before generating new code. 20+ tools, all typed, all schema-discovered, with new ones rolling out as the platform grows.

How does Cybe learn the business-logic rules?

It crawls the repo, builds a code knowledge graph (routes, services, owners, framework conventions, data-flow boundaries), and extracts the rules that govern how the codebase actually works, tenant scope, refund caps, idempotency keys, audit-trail completeness, role checks. Today the rules are mined and stored per project, scoped to the requested branch. Per-account refinement (org-wide rules that survive across projects) is rolling out next, with finer-grained personalisation still.

Which AI agents and IDEs support Cybe MCP?

Cursor, Claude Desktop, VS Code Copilot Chat (via .vscode/mcp.json), JetBrains, Gemini CLI, Cline, Continue, Zed, plus any client that speaks the MCP protocol. The same MCP server (npx @cybedefend/mcp-server or a Docker image) connects to all of them, one install, every surface.

Does the MCP server store any of my code?

No. The MCP itself is a thin wrapper around the CybeDefend REST API, every call is a request, the answer streams back, nothing persists locally. Findings, statuses and audit history live in your CybeDefend tenant. Source files are processed in memory by Cybe when you call get_business_logic_context, never persisted at rest by the MCP.

How is data residency handled?

Set REGION="eu" or REGION="us" (or pin a specific API_BASE) and every call lands in the corresponding region. Cross-region traffic only happens if you explicitly enable it. Both regions are SOC 2 Type II audited and the EU region maintains GDPR-compliant data flows.

Can the agent close findings on its own?

Yes, update_vulnerability lets the agent move a finding through the full status lifecycle, set priority and attach a comment. We recommend pairing it with get_similar_vulnerabilities so the agent can propose a batch action (mark a class of false-positives as not_exploitable in one shot, for instance), with each action stamped to the agent's identity for the audit trail.

Talk to us
Get started

Install free in your IDE. First scan in 5 minutes.

No credit card. No setup call. Pick your agent, paste the command, and Cybe enforces your rules from the very next prompt.

Region
claude mcp add cybedefend --transport http https://mcp-eu.cybedefend.com/mcp

Hosted MCP, no install. Just register the URL with your agent.

Book a 20-min demo