Fire in da houseTop Tip:Paying $100+ per month for Perplexity, MidJourney, Runway, ChatGPT and other tools is crazy - get all your AI tools in one site starting at $15 per month with Galaxy AI Fire in da houseCheck it out free

asterisk-mcp-server

MCP.Pizza Chef: getAsterisk

Asterisk MCP Server is a Model Context Protocol server that integrates with the Asterisk security API to provide real-time security scanning and vulnerability analysis for code snippets, codebases, and code changes. It enables AI assistants to perform automated security verification within development environments, enhancing code safety and compliance.

Use This MCP server To

Scan code snippets for security vulnerabilities in real time Analyze entire codebases for potential security risks Verify security compliance of code changes before deployment Integrate security scanning into IDEs via MCP protocol Enable AI assistants to perform automated security audits Provide detailed vulnerability reports to developers Support continuous security monitoring during development Facilitate secure code reviews with AI-powered insights

README

Asterisk MCP Server

A Model Context Protocol (MCP) server that provides security scanning capabilities for code snippets, codebases, and verification of code changes.

Overview

Asterisk MCP Server is a middleware component that connects to the Asterisk security API to provide real-time security analysis of code. It implements the Model Context Protocol (MCP) to expose security scanning tools to AI assistants like Claude, Cursor, Cline, Windsurf, etc. enabling them to analyze code for security vulnerabilities.

Architecture

flowchart LR
    IDE["IDE / Code Editor"] <--> |MCP Protocol| MCP["Asterisk MCP Server"]
    MCP <--> |HTTP/HTTPS| API["Asterisk Vulnerability Scanner API"]
    
    classDef primary fill:#6696FF,stroke:#333,stroke-width:1px,color:white;
    classDef secondary fill:#45556B,stroke:#333,stroke-width:1px,color:white;
    classDef tertiary fill:#FFCC00,stroke:#333,stroke-width:1px,color:black;
    
    class IDE primary;
    class MCP secondary;
    class API tertiary;
Loading

Features

  • Code Snippet Scanning: Analyze individual code snippets for security vulnerabilities
  • Codebase Scanning: Scan multiple files for security issues with accurate context coverage
  • Change Verification: Verify if code changes in your chat history introduce security vulnerabilities
  • Beautiful Settings UI: Configure the server through a graphical interface
  • Flexible Transport: Support for stdio and SSE transport protocols
  • Comprehensive Logging: Detailed logging with configurable verbosity

Requirements

  • Python 3.10+
  • pipx / uvx
  • httpx
  • mcp[cli]
  • dearpygui (for settings UI)

Usage

{
  "mcpServers": {
    "asterisk-mcp": {
      "command": "pipx",
      "args": [
        "run",
        "asterisk-mcp-server",
        "--api-url",
        "https://api.mcp.asterisk.so",
        "--transport",
        "stdio",
        "--key",
        "YOUR_API_KEY"
      ],
      "timeout": 3600
    }
  }
}

Configuration

Configuration can be provided through command-line arguments or the settings UI:

API Server Settings
  • --api-url: Base URL for the Asterisk API server
  • --key: API key for authentication (required for API access)
  • --timeout: Timeout for API requests in seconds (0 for no timeout)
MCP Server Settings
  • --server-name: Name of the MCP server
  • --transport: Transport protocol for the MCP server (stdio or sse)
  • --port: Port for the SSE server (used with --transport sse)
Logging Settings
  • --log-level: Logging level (DEBUG, INFO, WARNING, ERROR, CRITICAL)
  • --no-console: Disable console output (only log to file)

Available Tools

scan_snippet

Scans individual code snippets for security vulnerabilities.

scan_codebase

Scans multiple files for security issues.

verify

Verifies if code changes introduce security vulnerabilities.

settings

Opens the settings UI when the user enters "/asterisk".

Data Flow

  1. The IDE or code editor sends a request to the Asterisk MCP Server using the MCP protocol
  2. The MCP server processes the request and forwards it to the Asterisk Vulnerability Scanner API
  3. The API analyzes the code and returns security findings
  4. The MCP server formats the results and returns them to the IDE/editor
  5. The IDE/editor presents the security analysis to the user

Troubleshooting

Connection Issues

  • Verify that the API URL is correct and accessible
  • Check that your API key is valid and has not expired
  • Ensure your network allows connections to the API server

Authentication Errors

  • Verify your API key is correctly set in the configuration
  • Check that your API key has the necessary permissions
  • Regenerate your API key from the dashboard if necessary

Timeout Errors

  • Increase the API timeout setting for large codebases
  • Consider analyzing smaller portions of code separately
  • Check your network connection stability

License

This project is licensed under the Apache License, Version 2.0. See the LICENSE file in the repository for the full license text.

Getting Help

  • We're here to help! Reach out to us for any additional questions or assistance you might need at hello@asterisk.so.
  • Get your API key from https://app.mcp.asterisk.so

asterisk-mcp-server FAQ

How does the Asterisk MCP Server integrate with development tools?
It connects via the MCP protocol to IDEs and code editors, enabling seamless security scanning within the development environment.
What types of security issues can the Asterisk MCP Server detect?
It detects a wide range of vulnerabilities including code injection, insecure configurations, and known exploit patterns by leveraging the Asterisk Vulnerability Scanner API.
Can the Asterisk MCP Server analyze both code snippets and full codebases?
Yes, it supports scanning of individual code snippets as well as entire codebases for comprehensive security analysis.
Is the Asterisk MCP Server compatible with multiple AI assistants?
Yes, it supports integration with AI assistants like Claude, Cursor, Cline, and Windsurf through the MCP protocol.
How does the server ensure real-time security feedback?
By connecting directly to the Asterisk security API and exposing results via MCP, it provides immediate vulnerability insights during coding.
What protocols does the Asterisk MCP Server use for communication?
It uses the MCP protocol for communication with IDEs and HTTP/HTTPS to interact with the Asterisk Vulnerability Scanner API.
Can the Asterisk MCP Server be used in CI/CD pipelines?
While primarily designed for IDE integration, it can be adapted for CI/CD security checks by leveraging its API connectivity.
Does the server provide detailed reports on vulnerabilities?
Yes, it generates detailed security reports that help developers understand and fix issues effectively.