leroylim/upguard-cyberrisk-mcp-server-nodejs
If you are the rightful owner of upguard-cyberrisk-mcp-server-nodejs and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
The UpGuard CyberRisk MCP Server is a comprehensive solution for integrating with UpGuard's CyberRisk API, offering advanced security risk assessment and management capabilities.
upguard_comprehensive_risk_assessment
Complete risk assessment workflows
upguard_risk_trend_analysis
Multi-period risk trend analysis
upguard_compliance_reporting_suite
Automated compliance report generation
upguard_domain_lifecycle_management
Complete domain lifecycle workflows
upguard_bulk_asset_management
Large-scale asset management operations
UpGuard CyberRisk MCP Server
A Model Context Protocol (MCP) server for integrating with UpGuard's CyberRisk API. This server provides comprehensive security risk assessment and management capabilities through a standardized interface.
Features
- 67 API Tools across 13 categories for comprehensive security management
- 14 Enhanced Prompts including 8 advanced workflow prompts for complex operations
- Real-time Risk Assessment with vendor monitoring and breach detection
- Automated Documentation Generation with multiple output formats
- Interactive API Explorer with Swagger UI and Redoc interfaces
- Comprehensive Schema Validation with 22 Zod schema definitions
- CI/CD Integration with automated documentation deployment
Enhanced Prompts (New in v1.3.0)
The server now includes 14 comprehensive prompts (6 original + 8 enhanced) that provide guided workflows for complex security operations:
š“ Risk Management Prompts
upguard_comprehensive_risk_assessment
- Complete risk assessment workflowsupguard_risk_trend_analysis
- Multi-period risk trend analysis
š Compliance & Reporting
upguard_compliance_reporting_suite
- Automated compliance report generation
š Asset Management
upguard_domain_lifecycle_management
- Complete domain lifecycle workflowsupguard_bulk_asset_management
- Large-scale asset management operationsupguard_network_security_assessment
- Comprehensive network security analysis
šŖ Operations & Monitoring
upguard_setup_comprehensive_alerting
- Complete alerting infrastructure setupupguard_security_dashboard_setup
- Role-based security dashboard configuration
Benefits:
- Step-by-step guidance for complex security workflows
- Multi-tool orchestration combining multiple API endpoints
- Role-based workflows for different stakeholders (CISO, analysts, compliance)
- Best practices integration with built-in security recommendations
š See for detailed documentation and examples.
Quick Start
Prerequisites
- Node.js 18+
- npm or yarn
- UpGuard CyberRisk API credentials
Installation
git clone https://github.com/leroylim/upguard-cyberrisk-mcp-server-nodejs.git
cd upguard-cyberrisk-mcp-server-nodejs
npm install
Configuration
Create a .env
file with your UpGuard credentials:
UPGUARD_API_KEY=your_api_key_here
UPGUARD_SECRET_TOKEN=your_secret_token_here
Running the Server
npm start
MCP Configuration
To use this server with Claude Desktop or other MCP-compatible clients, you need to add it to your MCP configuration file.
For Claude Desktop (Windows/Mac/Linux)
Add the following configuration to your claude_desktop_config.json
file:
Windows: %APPDATA%\Claude\claude_desktop_config.json
Mac: ~/Library/Application Support/Claude/claude_desktop_config.json
Linux: ~/.config/Claude/claude_desktop_config.json
{
"mcpServers": {
"upguard-mcp": {
"command": "node",
"args": [
"/path/to/your/upguard-cyberrisk-mcp-server/src/index.js"
],
"env": {
"UPGUARD_API_KEY": "your_upguard_api_key_here"
}
}
}
}
For Cursor IDE
Add the following configuration to your mcp.json
file in your Cursor settings directory:
Windows: %APPDATA%\Cursor\User\mcp.json
Mac: ~/Library/Application Support/Cursor/User/mcp.json
Linux: ~/.config/Cursor/User/mcp.json
{
"mcpServers": {
"upguard-mcp": {
"command": "node",
"args": [
"/path/to/your/upguard-cyberrisk-mcp-server/src/index.js"
],
"env": {
"UPGUARD_API_KEY": "your_upguard_api_key_here"
}
}
}
}
Configuration Notes
- Replace the path: Update
/path/to/your/upguard-cyberrisk-mcp-server/src/index.js
with the actual path to your installation - Replace the API key: Update
your_upguard_api_key_here
with your actual UpGuard API key - Server name: You can change
upguard-mcp
to any name you prefer - Additional environment variables: If you're using
UPGUARD_SECRET_TOKEN
, add it to theenv
section as well
Getting Your UpGuard API Key
Prerequisites:
- An UpGuard account with administrator access (only administrators can access API tokens)
- Access to the UpGuard platform at cyber-risk.upguard.com
Step-by-step instructions:
- Log in to your UpGuard account at https://cyber-risk.upguard.com
- Click the Settings icon in UpGuard's top-right corner
- Navigate to the API tab in the settings menu
- Create or manage API keys:
- Any existing API keys will be listed here
- Click "Create new API key" to generate a new key
- You can also delete existing keys from this tab if needed
- Copy your API key - it will be an alphanumeric string
- Paste the key into your MCP configuration file
Testing your API key (optional): You can verify your API key works by testing it with curl:
curl -H "Authorization: YOUR_API_KEY" "https://cyber-risk.upguard.com/api/public/vendors"
Security Notes:
- Keep your API key secure and don't share it publicly
- Only administrators can create and manage API keys
- You can create multiple API keys and delete them as needed
- The API base URL is:
https://cyber-risk.upguard.com/api/public
For more detailed information, see the official UpGuard API authentication guide.
Restart Required
After updating your MCP configuration, restart Claude Desktop or your IDE for the changes to take effect.
Documentation System
This project features a comprehensive documentation generation system that creates multiple formats from the source code:
š Available Documentation Formats
- š Interactive Documentation Hub - Central navigation with statistics
- š Swagger UI - Interactive API explorer for testing endpoints
- š Redoc - Beautiful, professional API documentation
- š Markdown - Human-readable documentation with examples
- š§ OpenAPI Specification - Machine-readable API spec for tooling
š ļø Documentation Commands
# Generate complete documentation pipeline
npm run docs:full
# Individual generation steps
npm run docs:extract # Extract tools from source code
npm run docs:generate # Generate OpenAPI and Markdown
npm run docs:html # Generate HTML documentation
npm run docs:test # Validate generated documentation
# Utility commands
npm run docs:clean # Clean generated files
npm run docs:build # Generate with mock fallback
š Documentation Statistics
- 67 API Tools documented across 13 categories
- 22 Schema Definitions with Zod validation
- 54 Tools with Schemas (80% schema coverage)
- 195KB OpenAPI Specification with comprehensive examples
- 37KB Markdown Documentation with authentication guides
š Viewing Documentation
After running npm run docs:full
, open any of these files in your browser:
- Documentation Hub:
docs/generated/index.html
- Swagger UI:
docs/generated/swagger.html
- Redoc:
docs/generated/redoc.html
- Markdown:
docs/generated/API.md
- OpenAPI Spec:
docs/generated/openapi.json
API Categories
š”ļø Risk Management (10 tools)
- Get available risks and risk details
- Account and vendor risk monitoring
- Risk filtering and categorization
š¢ Vendor Management (16 tools)
- Monitor and manage vendor security
- Vendor risk assessments
- Bulk vendor operations
š Domain Management (9 tools)
- Domain monitoring and analysis
- Subdomain discovery
- Domain risk assessment
š IP Management (5 tools)
- IP address monitoring
- Network security analysis
- IP risk evaluation
š Report Generation (7 tools)
- Custom security reports
- Automated report scheduling
- Report data export
šØ Breach Monitoring (2 tools)
- Data breach detection
- Breach impact analysis
ā” Bulk Operations (6 tools)
- Batch processing capabilities
- Mass vendor updates
- Bulk data operations
š Webhook Management (5 tools)
- Event notification setup
- Webhook configuration
- Real-time alerts
š Additional Categories
- Questionnaire Management (1 tool)
- Typosquat Detection (1 tool)
- Label Management (1 tool)
- Notification Management (1 tool)
- General (3 tools)
Development
Project Structure
āāā src/
ā āāā tools/ # API tool implementations
ā ā āāā schemas/ # Zod schema definitions
ā ā āāā risks.js # Risk management tools
ā ā āāā vendors.js # Vendor management tools
ā ā āāā ... # Other tool categories
ā āāā utils/
ā āāā doc-generator.js # Documentation generator
ā āāā logger.js # Logging utility
āāā scripts/
ā āāā extract-tools-direct.js # Tool extraction
ā āāā generate-docs.js # Documentation generation
ā āāā generate-html-docs.js # HTML documentation
ā āāā test-docs.js # Documentation testing
āāā docs/
ā āāā generated/ # Generated documentation
ā āāā extracted-tools.json # Extracted tool data
āāā .github/workflows/
āāā docs.yml # CI/CD documentation pipeline
Adding New Tools
- Create tool implementation in appropriate category file
- Add schema definitions to
src/tools/schemas/index.js
- Run
npm run docs:full
to update documentation - Test with
npm run docs:test
Schema Validation
All tools use Zod schemas for input validation:
const { z } = require('zod');
const { vendorHostname, labels } = require('./schemas');
// Tool with schema validation
server.tool('tool_name', 'Description', {
hostname: vendorHostname,
labels: labels.optional()
}, async (args) => {
// Implementation
});
CI/CD Integration
The project includes automated documentation generation via GitHub Actions:
- Triggers: Push to main/master, tool file changes, manual dispatch
- Generates: All documentation formats automatically
- Deploys: GitHub Pages with interactive documentation
- Artifacts: Documentation files with 30-day retention
Testing
# Run all tests
npm test
# Lint code
npm run lint
npm run lint:fix
# Test documentation
npm run docs:test
Contributing
- Fork the repository
- Create a feature branch
- Add tools with proper schemas
- Update documentation with
npm run docs:full
- Test changes with
npm run docs:test
- Submit a pull request
License
MIT License - see file for details.
Support
- GitHub Issues: Report bugs or request features
- Documentation: Available in multiple formats in
docs/generated/
- API Reference: Interactive Swagger UI and Redoc interfaces
UpGuard CyberRisk MCP Server v1.3.0 | Licensed under MIT |