marlinkcyber/basicsec-mcp
If you are the rightful owner of basicsec-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
BasicSec MCP Server is a Model Context Protocol server that offers DNS and email security scanning capabilities using the basicsec library.
BasicSec MCP Server
A Model Context Protocol (MCP) server that provides DNS and email security scanning capabilities using the basicsec library.
Features
- MCP Integration: Full Model Context Protocol support for AI assistants
- DNS Security Analysis: SPF, DMARC, DNSSEC validation
- Email Security Checks: MX record analysis and SMTP testing
- Batch Processing: Scan multiple domains efficiently
- Passive & Active Modes: Choose between DNS-only or full SMTP testing
- Performance Optimized: Designed to work within MCP timeout constraints
Installation
pip install basicsec-mcp
MCP Server Usage
Running the Server
basicsec-mcp
The server will start and listen for MCP connections on the default interface.
MCP Tools Available
The server provides the following MCP tools:
Domain Scanning Tools
passive_scan(domain, dns_timeout=5.0)
- DNS-only security scanactive_scan(domain, dns_timeout=5.0, smtp_timeout=3.0, smtp_ports=[25,465,587])
- Full scan with SMTP testsscan_multiple_domains(domains, scan_type="active", dns_timeout=3.0, smtp_timeout=2.0)
- Batch domain scanningquick_domain_check(domains, check_types=["live","mx","spf","dmarc"])
- Fast batch checks
Individual Record Tools
get_mx_records(domain, timeout=5.0)
- Get MX recordsget_spf_record(domain, timeout=5.0)
- Get and validate SPF recordget_dmarc_record(domain, timeout=5.0)
- Get and validate DMARC recordcheck_dnssec_status(domain, timeout=5.0)
- Check DNSSEC statusvalidate_dnssec_chain(domain, timeout=5.0)
- Validate DNSSEC chain of trusttest_smtp_connection(hostname, port=25, timeout=3.0)
- Test SMTP connectivity
Claude Desktop Integration
Add to your Claude Desktop configuration:
{
"mcpServers": {
"basicsec": {
"command": "basicsec-mcp",
"args": []
}
}
}
Or using uvx:
{
"mcpServers": {
"basicsec": {
"command": "uvx",
"args": ["--refresh","basicsec-mcp"]
}
}
}
Usage Examples
Once connected via MCP, you can use the tools through your AI assistant:
"Scan example.com for email security issues"
-> Uses passive_scan() or active_scan()
"Check SPF and DMARC records for google.com"
-> Uses get_spf_record() and get_dmarc_record()
"Test SMTP connectivity for mail.example.com"
-> Uses test_smtp_connection()
"Quick check these domains: example.com, google.com, github.com"
-> Uses quick_domain_check()
Security Checks Performed
DNS Records
- MX Records: Mail server configuration
- SPF Records: Sender Policy Framework validation
- DMARC Records: Domain-based Message Authentication
- DNSSEC: DNS Security Extensions status and chain validation
SMTP Tests (Active Scans)
- Connection Testing: Verify mail server accessibility
- STARTTLS Support: Check encryption capability
- Multiple Ports: Test common SMTP ports (25, 465, 587)
Performance Considerations
The MCP server is optimized for responsiveness:
- Timeout Management: Reduced timeouts for batch operations
- Domain Limits: Automatic limiting of batch sizes
- Quick Checks: Minimal DNS lookups for fast results
- Error Handling: Graceful degradation on failures
Configuration
Environment Variables
BASICSEC_MCP_LOG_LEVEL
: Set logging level (DEBUG, INFO, WARNING, ERROR)BASICSEC_MCP_DNS_TIMEOUT
: Default DNS timeout in secondsBASICSEC_MCP_SMTP_TIMEOUT
: Default SMTP timeout in seconds
Programmatic Usage
You can also use the server components directly:
from basicsec_mcp.server import passive_scan, active_scan
# Direct function calls
result = passive_scan("example.com")
print(f"SPF Valid: {result['spf_valid']}")
result = active_scan("example.com")
print(f"SMTP Working: {result['has_smtp_connection']}")
Requirements
- Python 3.8+
- basicsec>=1.0.0
- mcp>=1.0.0
Development
# Install development dependencies
pip install -e ".[dev]"
# Run tests
pytest
# Run server locally
python -m basicsec_mcp.server
License
MIT License - see LICENSE file for details.
Security Considerations
This MCP server is designed for defensive security analysis only:
✅ Allowed Operations:
- DNS record lookups
- Standard SMTP protocol tests
- Public security record validation
❌ Not Performed:
- Vulnerability exploitation
- Unauthorized access attempts
- Aggressive scanning techniques
Always ensure you have permission to scan target domains.
Contributing
- Fork the repository
- Create a feature branch
- Add tests for new functionality
- Ensure MCP compatibility
- Submit a pull request
Related Projects
- basicsec - Core security scanning library
- Model Context Protocol - Protocol specification