Practical Notes
- Quant: README says adding
NVD_API_KEYincreases NVD rate limit from 5 → 50 requests per 30 seconds. - Quant: the MCP inspector example opens at http://localhost:6274 for interactive tool testing.
Main
A staged rollout that avoids alert fatigue:
- Start with free signals (EPSS + CISA KEV + baseline NVD) to answer “is this exploited?”.
- Add
NVD_API_KEYearly for throughput (5→50 req/30s), then add other keys only if you truly need them. - Write a triage prompt template that always outputs: affected versions, exploit likelihood, KEV status, and a patch recommendation with deadline.
Keep .env out of git and treat threat-intel keys as production secrets.
FAQ
Q: Can I start without any API keys? A: Yes—README says you can test with free tools first and add keys progressively.
Q: Why add NVD key first? A: It provides a 10× throughput bump: 5→50 requests per 30 seconds.
Q: How do I validate the server?
A: Use claude mcp list or run the MCP inspector on localhost to test tools interactively.