contrastapi

mcp
Guvenlik Denetimi
Basarisiz
Health Uyari
  • License — License: MIT
  • Description — Repository has a description
  • Active repo — Last push 0 days ago
  • Low visibility — Only 5 GitHub stars
Code Basarisiz
  • eval() — Dynamic code execution via eval() in app/codesec/injection.py
  • execSync — Synchronous shell command execution in app/codesec/injection.py
  • exec() — Shell command execution in app/codesec/injection.py
  • spawnSync — Synchronous process spawning in app/codesec/injection.py
Permissions Gecti
  • Permissions — No dangerous permissions requested
Purpose
This MCP server and API provide security intelligence capabilities for AI agents and developers. It offers 30+ endpoints for tasks like CVE lookups, domain reconnaissance, IP reputation checks, and code security scanning.

Security Assessment
The tool acts as a bridge to external network services, making frequent outbound requests to third-party APIs (like Shodan and AbuseIPDB) and public targets. The automated scan failed multiple critical checks due to dynamic code execution and synchronous shell command execution found in the code security module (`app/codesec/injection.py`). While this might be an intentional feature designed to test payloads for vulnerabilities, it introduces a high risk of Remote Code Execution (RCE) if an attacker can manipulate the tool's inputs. No hardcoded secrets or excessive system permissions were found. Overall risk: High.

Quality Assessment
The project is actively maintained, with its most recent push occurring today. It uses a permissive MIT license and claims a strong test suite of 573 passing tests. However, it suffers from extremely low community visibility (only 5 GitHub stars), which means the codebase has not been widely peer-reviewed by independent security experts.

Verdict
Use with caution. While the API endpoints themselves are useful, developers must strictly sanitize any inputs passed to the code security module to prevent severe command injection vulnerabilities.
SUMMARY

Security intelligence API for AI agents and developers. CVE lookup, domain recon, IP reputation, tech fingerprinting, threat intel, code security. 20 tools.

README.md

ContrastAPI

License: MIT
Python 3.12
Tests
RapidAPI

Security intelligence API for AI agents and developers. 30+ endpoints: CVE lookup with EPSS/KEV enrichment, domain reconnaissance, SSL analysis, IP reputation (AbuseIPDB, Shodan), IOC/malware lookup, exploit search, technology fingerprinting, and code security verification. Free, no signup required.

Live: api.contrastcyber.com | Scanner: contrastcyber.com

Why ContrastAPI?

  • One call, full picture — domain report returns DNS + WHOIS + SSL + subdomains + WAF + IP reputation in a single response
  • CVE intelligence — 340K+ CVEs enriched with EPSS exploit probability and CISA KEV status
  • IP reputation — AbuseIPDB, Shodan enrichment with 24-hour cache
  • Tech fingerprinting — detect CMS, frameworks, CDN, analytics from headers + HTML
  • AI-native — LLM-optimized summaries, structured JSON, OpenAPI spec
  • Free forever — 100 req/hr, no API key, no signup

Quick Start

# Domain intelligence
curl "https://api.contrastcyber.com/v1/domain/example.com"

# CVE lookup with EPSS + KEV
curl "https://api.contrastcyber.com/v1/cve/CVE-2024-3094"

# Search CVEs
curl "https://api.contrastcyber.com/v1/cves?product=apache&severity=critical"

# SSL analysis
curl "https://api.contrastcyber.com/v1/ssl/example.com"

# IOC lookup (IP, domain, URL, or hash)
curl "https://api.contrastcyber.com/v1/ioc/8.8.8.8"

# Public exploit search
curl "https://api.contrastcyber.com/v1/exploit/CVE-2024-3400"

# Check code for secrets
curl -X POST "https://api.contrastcyber.com/v1/check/secrets" \
  -H "Content-Type: application/json" \
  -d '{"code": "password = \"admin123\"", "language": "python"}'

Endpoints

Domain Intelligence

GET  /v1/domain/{domain}       Full domain report (DNS + WHOIS + SSL + subs + WAF + reputation)
GET  /v1/dns/{domain}          DNS records (A, AAAA, MX, NS, TXT, CNAME, SOA)
GET  /v1/whois/{domain}        WHOIS registration data
GET  /v1/subdomains/{domain}   Subdomain enumeration (DNS brute + CT logs)
GET  /v1/certs/{domain}        Certificate transparency logs
GET  /v1/ssl/{domain}          SSL/TLS analysis (cipher, cert chain, grade A-F)
GET  /v1/ip/{ip}               IP intel + reputation (AbuseIPDB, Shodan)
GET  /v1/tech/{domain}         Technology fingerprinting (CMS, frameworks, CDN, analytics)
GET  /v1/threat/{domain}       Threat intelligence (URLhaus malware URLs)
GET  /v1/scan/headers/{domain} Live HTTP security header scan
GET  /v1/monitor/{domain}      Lightweight domain health check
GET  /v1/domain/{domain}/vulns Tech stack CVE scan
POST /v1/domains/bulk          Bulk domain scan (10 free, 50 pro)

CVE Intelligence

GET /v1/cve/{cve_id}           CVE details + EPSS + KEV
GET /v1/cves?product=&severity= Search CVEs
GET /v1/cves/recent?hours=24   Latest CVEs
GET /v1/cves/kev               CISA exploited vulns
GET /v1/epss/{cve_id}          Exploit probability
GET /v1/exploit/{cve_id}       Public exploit search (GitHub Advisory + Shodan)

Threat Intelligence

GET /v1/ioc/{indicator}        Unified IOC enrichment (IP, domain, URL, hash)
GET /v1/hash/{hash}            Malware hash reputation (MalwareBazaar)
GET /v1/password/{sha1}        Password breach check (HIBP, k-anonymity)
GET /v1/phishing/{url}         Phishing/malware URL check (URLhaus)

Code Security

POST /v1/check/headers         Validate HTTP security headers
POST /v1/check/secrets         Detect hardcoded secrets
POST /v1/check/injection       SQL/cmd injection patterns
POST /v1/check/dependencies    Check packages for known CVEs

Rate Limits

Tier Limit API Key
Free 100 req/hr Not required
Pro 1,000 req/hr Get API Key

Data Sources

Source Records Update
NVD (NIST) 340k+ CVEs Every 2 hours
CISA KEV 1,500+ exploited vulns Every 2 hours
FIRST EPSS 323k+ exploit scores Every 2 hours

Docs

Self-Hosting

git clone https://github.com/UPinar/contrastapi.git
cd contrastapi
python3 -m venv venv
venv/bin/pip install -r requirements.txt
cd app
../venv/bin/uvicorn main:app --host 127.0.0.1 --port 8002

Tests

cd app && PYTHONPATH=. python -m pytest tests/ -v

573 tests covering auth, rate limiting, validation, database operations, domain intelligence, CVE intelligence, threat intelligence, code security, tech fingerprinting, IP reputation, and API routes.

Stack

  • Runtime: Python 3.12, FastAPI, uvicorn
  • Database: SQLite (WAL mode, 3 databases)
  • DNS: dnspython
  • HTTP: httpx

Also Available On

License

MIT

Yorumlar (0)

Sonuc bulunamadi