gc-sslscan-mcp
v1.1.5
Published
Model Context Protocol (MCP) server for interacting with sslscan SSL/TLS scanner
Maintainers
Readme
SSLScan MCP
SSLScan MCP is a bridge that connects SSLScan, the comprehensive SSL/TLS security testing tool, with the Model Context Protocol (MCP) ecosystem.
Overview
SSLScan MCP enables seamless integration of SSLScan's SSL/TLS assessment capabilities into MCP-compatible applications and AI-powered workflow systems. This bridge allows you to leverage SSLScan functionality through a standardized protocol, making it easier to incorporate into automated security testing pipelines or AI assistant capabilities.
Features
- Full SSLScan functionality exposed through MCP
- Simple configuration and setup
- Easy integration with other MCP-compatible tools and systems
- Standardized input/output handling
- Support for all SSLScan options and configurations
Installation
Prerequisites
- Node.js (v16 or higher)
- SSLScan installed on your system
Installation
# Install globally
npm install -g gc-sslscan-mcp
# Or run directly without installing
npx gc-sslscan-mcpConfiguration
This server requires the path to the SSLScan executable to be set via the SSLSCAN_PATH environment variable.
Example:
# Linux/macOS
export SSLSCAN_PATH=/usr/local/bin/sslscan
# Windows
set SSLSCAN_PATH=C:\path\to\sslscan\sslscan.exeUsage
Command Line
# With SSLSCAN_PATH environment variable set
npx gc-sslscan-mcpWith Claude Desktop
Add to your claude_desktop_config.json:
{
"mcpServers": {
"sslscan": {
"command": "npx",
"args": ["-y", "gc-sslscan-mcp"],
"env": {
"SSLSCAN_PATH": "C:\\path\\to\\sslscan\\sslscan.exe"
}
}
}
}With Other MCP Clients
For other MCP clients, you can configure them to use this server with:
SSLSCAN_PATH=/path/to/sslscan npx gc-sslscan-mcpRunning SSLScan Tests
Once configured, you can run SSLScan tests through the MCP interface using the do-sslscan tool:
// Example of calling SSLScan through MCP
const result = await mcp.tools.invoke("do-sslscan", {
target: "https://example.com",
sslscan_args: ["--no-fallback", "--no-heartbleed"]
});Available Options
SSLScan MCP supports all standard SSLScan parameters through the sslscan_args array.
Examples
Basic SSL/TLS Assessment
const result = await mcp.tools.invoke("do-sslscan", {
target: "https://example.com",
sslscan_args: []
});Check for Legacy Protocol Support
const result = await mcp.tools.invoke("do-sslscan", {
target: "https://example.com",
sslscan_args: ["--ssl3", "--tls10"]
});Comprehensive SSL/TLS Audit
const result = await mcp.tools.invoke("do-sslscan", {
target: "https://example.com",
sslscan_args: [
"--show-certificate",
"--show-ciphers",
"--no-fallback",
"--no-heartbleed"
]
});STARTTLS for Email Servers
const result = await mcp.tools.invoke("do-sslscan", {
target: "mail.example.com",
sslscan_args: ["--starttls-smtp"]
});Integration with AI Assistants
SSLScan MCP is designed to work seamlessly with AI assistants that support the Model Context Protocol, enabling natural language interactions for SSL/TLS security testing tasks.
Example conversation with an AI assistant:
User: Check the SSL/TLS configuration of example.com
AI: I'll help you analyze the SSL/TLS configuration of example.com using SSLScan.
[AI uses SSLScan MCP to run the assessment and returns the results]
SSLScan results for example.com:
- TLSv1.0 is disabled
- TLSv1.3 is supported
- Weak ciphers are not supported
- Certificate is valid and trusted
- No Heartbleed vulnerability detected
...Security Considerations
- Always obtain proper authorization before testing websites
- Use responsibly and ethically
- Some tests may be logged by the target server's security monitoring systems
Troubleshooting
If you encounter issues:
- Verify SSLScan is properly installed and accessible
- Check the path to the SSLScan executable in your configuration
- Ensure proper permissions are set for execution
- Review server logs for detailed error messages
- Confirm that the target URL begins with
https://for proper SSL/TLS scanning
License
Apache-2.0
Acknowledgments
- SSLScan Project: https://github.com/rbsec/sslscan
- Model Context Protocol: https://github.com/modelcontextprotocol
