feat: add agent-bom MCP server (v0.68.2 — 30 tools)#784
feat: add agent-bom MCP server (v0.68.2 — 30 tools)#784msaad00 wants to merge 11 commits intostacklok:mainfrom
Conversation
1703a02 to
80cb5b9
Compare
80cb5b9 to
0074c4c
Compare
AI supply chain security scanner for MCP servers and AI agents. Provides CVE scanning, blast radius analysis, policy enforcement, SBOM generation (CycloneDX/SPDX/SARIF), and remediation planning. Signed-off-by: Mohamed Saad <msaad00@users.noreply.github.com> Signed-off-by: Wegz <mohamedsaad@Wegzs-MacBook-Pro.local>
- Update image from docker.io/agentbom/agent-bom:0.28.1 to ghcr.io/msaad00/agent-bom:v0.31.1 - Fix namespace from io.github.stacklok to io.github.msaad00 - Update version from 1.0.0 to 0.31.1 - Add check tool and npm/PyPI to allowed network hosts
…compliance frameworks Major update from v0.31.1 (8 tools) to v0.54.0 (18 tools): New tools: verify, where, inventory, diff, skill_trust, marketplace_check, code_scan, context_graph, analytics_query, cis_benchmark New capabilities: - CIS benchmarks (AWS Foundations v3.0, Snowflake v1.0) - 20 MCP client auto-discovery - 13 cloud provider scanning - 10 compliance frameworks (OWASP LLM, MITRE ATLAS, NIST, EU AI Act, ...) - Policy-as-code with 18 conditions - Transitive dependency resolution (npm, PyPI, Go, Cargo, Maven)
0074c4c to
98d0d4a
Compare
- Version: 0.55.0 → 0.68.1 - Tools: 18 → 30 (added fleet_scan, runtime_correlate, vector_db_scan, aisvs_benchmark, gpu_infra_scan, dataset_card_scan, training_pipeline_scan, browser_extension_scan, model_provenance_scan, prompt_scan, model_file_scan, license_compliance_scan) - Description: updated to canonical tagline - Tags: added ai-infrastructure, gpu, runtime-enforcement - Env vars: added optional SNYK_TOKEN - Author: corrected to Wagdy Saad Signed-off-by: Wagdy Saad <andwgdysaad@gmail.com>
Signed-off-by: Wagdy Saad <andwgdysaad@gmail.com>
- Add icon.svg (shield logo) to server directory - Add icons array to server.json pointing to raw GitHub URL - Add overview markdown in _meta (capabilities summary) - Change version from "0.68.1" to "1.0.0" (catalog entry version, not software version) - Remove SNYK_TOKEN (unnecessary env var) Signed-off-by: Wagdy Saad <andwgdysaad@gmail.com>
Signed-off-by: Wagdy Saad <andwgdysaad@gmail.com>
|
Hi @msaad00, thanks for your patience on this, it took us a bit longer to get through the review 🍻 Here are the main findings:
One broader note: the project is very new (~3 weeks) with an extremely high release cadence (~70 versions). That's not a blocker, but it does mean we'd be updating the catalog entry frequently. Something to keep in mind as we think about stability for users. Let us know if you have questions and thanks for reaching out! 🙏 |
…ersion, tool count
## Summary Addresses all 4 review points from rdimitrov on stacklok/toolhive-catalog#784. - **_meta publisher namespace**: `io.github.msaad00` → `io.github.stacklok` (confirmed correct format against Stripe, AWS API, Slack entries in the catalog) - **SNYK_TOKEN**: already absent from `server.json` — only `NVD_API_KEY` is present. Will update PR description in toolhive-catalog to remove the stale SNYK mention. - **Build provenance/attestation**: added `actions/attest-build-provenance@a2bbfa25...` to `publish-mcp.yml` `publish-stdio` job — GHCR image gets SLSA attestation on every release going forward - **Tool count**: added `ingest_external_scan` as the 31st tool in `_meta.tools` (was missing from the list) - **Image tag**: v0.70.5 (current); renovate automation handles future bumps as reviewer noted ## What was NOT changed - `actions/attest-build-provenance` was already present in `release.yml` for PyPI packages — this PR extends it to cover the GHCR Docker image as well
|
Hi @rdimitrov, thanks for the thorough review! All 4 points addressed:
Re the release cadence note — understood. The high version count is from the initial burst of feature work; it's stabilizing. For catalog maintenance, renovate will handle image tag bumps automatically. |
|
Update on point 2 (SNYK_TOKEN / env vars): After further review, we've removed |
agent-bom — Security scanner for AI infrastructure
Adds agent-bom to the ToolHive catalog.
30 MCP tools covering: CVE scanning, blast radius analysis, credential exposure detection, CIS benchmarks, policy enforcement, SBOM generation, compliance across 11 frameworks (OWASP LLM/MCP/Agentic, MITRE ATLAS, NIST AI RMF, EU AI Act, and more).
Server details
ghcr.io/msaad00/agent-bom:v0.68.1Optional environment variables
NVD_API_KEYSNYK_TOKEN