The MCP server runs the 'vet' tool, which provides real-time malicious package detection and software supply chain security by analyzing code usage and enforcing security policies.
From the registry: Protect your AI agents and IDEs from malicious open-source packages.
$ brew install safedep/tap/vethttps://github.com/safedep/vet/releasesPlease install the `vet-mcp` MCP server into my current AI client (that's you).
Required prerequisites (do these first if not already done):
- **vet CLI** — Install the vet CLI tool via homebrew or npm Run: `brew install safedep/tap/vet` (https://github.com/safedep/vet/releases)
Canonical MCP server config (stdio transport):
- command: `vet`
- args: ["mcp"]
- optional environment variables:
- `VET_API_KEY`: SafeDep Cloud API key for advanced malware detection (example: `<your-api-key>`)
Note: vet is a software supply chain security tool. The MCP server mode is documented at docs/mcp.md. Supports malware detection, vulnerability analysis, and policy-as-code. Free for open source projects.
Add this MCP server to my current client's config in the correct format for you. If you need secrets or credentials I haven't provided, ASK me — do not invent values or leave raw placeholders. After adding it, tell me how to verify the server is connected.VET_DISABLE_TELEMETRYDisable telemetry collection for anonymous usage data.Dead code, security, secrets detection and code quality for Python, TypeScript, Go.
Manage UniFi Access doors, credentials, policies, visitors, and events via MCP.
AI-powered threat hunting and incident response MCP server for Elasticsearch/OpenSearch