<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Uygar Pinar</title>
    <description>The latest articles on DEV Community by Uygar Pinar (@contrastcyber).</description>
    <link>https://dev.to/contrastcyber</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3862120%2F7aa41086-bdcd-44b0-8dc3-c140f4f54e9e.png</url>
      <title>DEV Community: Uygar Pinar</title>
      <link>https://dev.to/contrastcyber</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/contrastcyber"/>
    <language>en</language>
    <item>
      <title>I Built 24 Security Tools That AI Agents Can Use</title>
      <dc:creator>Uygar Pinar</dc:creator>
      <pubDate>Mon, 06 Apr 2026 18:30:44 +0000</pubDate>
      <link>https://dev.to/contrastcyber/i-built-23-security-tools-that-ai-agents-can-use-4he7</link>
      <guid>https://dev.to/contrastcyber/i-built-23-security-tools-that-ai-agents-can-use-4he7</guid>
      <description>&lt;p&gt;I wanted a single interface where an AI agent could run WHOIS, pull SSL certs, enumerate subdomains, check CVEs, and query threat intel feeds — all from one prompt.&lt;/p&gt;

&lt;p&gt;So I built 24 security tools as an MCP server. Any AI agent that speaks MCP can call them natively.&lt;/p&gt;

&lt;p&gt;Here's what I built, how to set it up, and what I learned.&lt;/p&gt;




&lt;h2&gt;
  
  
  Setup (2 minutes)
&lt;/h2&gt;

&lt;p&gt;Let me start with the setup because it's the simplest part.&lt;/p&gt;

&lt;p&gt;Add this to your MCP client config:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"mcpServers"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"contrast"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"command"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"npx"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"args"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"-y"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"@anthropic-ai/mcp-remote"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"https://api.contrastcyber.com/mcp/"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Works with Claude Desktop, Cursor, Windsurf, Cline, VS Code — anything that speaks &lt;a href="https://modelcontextprotocol.io/" rel="noopener noreferrer"&gt;MCP&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;No API key. No signup. &lt;strong&gt;100 requests/hour free.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The 24 Tools
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Recon — "What's running on this domain?"
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;What it does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;domain_report&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Full security report — DNS, WHOIS, SSL, subdomains, risk score&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;dns_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;A, AAAA, MX, NS, TXT, CNAME, SOA records&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;whois_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Registrar, creation date, expiry, nameservers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;ssl_check&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Certificate chain, cipher suite, expiry, grade (A-F)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;subdomain_enum&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Brute-force + Certificate Transparency logs&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;tech_fingerprint&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;CMS, frameworks, CDN, analytics, server stack&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;scan_headers&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Live HTTP security headers — CSP, HSTS, X-Frame-Options&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;email_mx&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Mail provider, SPF/DMARC/DKIM validation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;wayback_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Web archive history — snapshots from Wayback Machine&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;ip_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;PTR, open ports, hostnames, reputation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;asn_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;AS number, holder, IP prefixes&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;Real scenario:&lt;/strong&gt; "Check if any of our subdomains have expiring SSL certs" — the agent calls &lt;code&gt;subdomain_enum&lt;/code&gt;, loops through each result with &lt;code&gt;ssl_check&lt;/code&gt;, and reports which ones expire within 30 days. Zero code.&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability — "Is this CVE exploitable?"
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;What it does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;cve_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;CVE details, CVSS, EPSS score, KEV status&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;cve_search&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Search by product, severity, or date range&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;exploit_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Public exploits from GitHub Advisory + ExploitDB&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;Real scenario:&lt;/strong&gt; "Find all critical CVEs for Apache httpd from the last 6 months that have public exploits" — one sentence, three tool calls chained automatically.&lt;/p&gt;

&lt;h3&gt;
  
  
  Threat Intelligence — "Is this IOC malicious?"
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;What it does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;ioc_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Auto-detect IP/domain/URL/hash → ThreatFox + URLhaus&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;hash_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Malware hash reputation via MalwareBazaar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;phishing_check&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Known phishing/malware URL check&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;password_check&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Breach check via HIBP (k-anonymity, password never sent)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;email_disposable&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Disposable/temporary email detection&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;Real scenario:&lt;/strong&gt; You get a suspicious URL in Slack. Paste it and ask "is this safe?" — the agent runs &lt;code&gt;phishing_check&lt;/code&gt; + &lt;code&gt;ioc_lookup&lt;/code&gt; and tells you if it's a known threat.&lt;/p&gt;

&lt;h3&gt;
  
  
  Code Security — "Does my code have vulnerabilities?"
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;What it does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;check_secrets&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Detect hardcoded AWS keys, tokens, passwords in source&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;check_injection&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;SQL injection, command injection, path traversal&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;check_headers&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Validate security header configuration&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;Real scenario:&lt;/strong&gt; Before a PR merge, ask your agent to scan the diff for hardcoded secrets and injection vulnerabilities.&lt;/p&gt;

&lt;h3&gt;
  
  
  Phone &amp;amp; Email — "Is this contact legit?"
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;What it does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;phone_lookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Validation, country, carrier, line type&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  What It Looks Like
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;"Run a full security audit on example.com"&lt;br&gt;
&lt;/p&gt;
&lt;/blockquote&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Domain: example.com
Risk Score: 32/100 (Low)

DNS: 6 records found
SSL: Grade A, expires 2027-01-15, TLS 1.3
Headers: 4/7 present (missing CSP, HSTS preload, Permissions-Policy)
Subdomains: 3 found
WHOIS: Registered 1995-08-14, ICANN
Tech: Akamai CDN, nginx
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;blockquote&gt;
&lt;p&gt;"Check if CVE-2024-3094 has public exploits"&lt;br&gt;
&lt;/p&gt;
&lt;/blockquote&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;CVE-2024-3094 (xz backdoor)
CVSS: 10.0 CRITICAL
EPSS: 0.947 (top 0.1%)
KEV: Yes — actively exploited
Exploits found: 3
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;blockquote&gt;
&lt;p&gt;"Is this password breached: hunter2"&lt;br&gt;
&lt;/p&gt;
&lt;/blockquote&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;EXPOSED in 17,043 breaches
Do NOT use this password.
(checked via k-anonymity — password was never transmitted)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Why MCP?
&lt;/h2&gt;

&lt;p&gt;ContrastAPI is also a &lt;a href="https://api.contrastcyber.com" rel="noopener noreferrer"&gt;REST API&lt;/a&gt; with a &lt;a href="https://www.npmjs.com/package/contrastapi" rel="noopener noreferrer"&gt;Node.js SDK&lt;/a&gt;. You can &lt;code&gt;curl&lt;/code&gt; it from any language.&lt;/p&gt;

&lt;p&gt;But MCP changes the workflow:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Without MCP:&lt;/strong&gt; Call endpoint → parse JSON → decide next step → call another endpoint → parse again → format output.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;With MCP:&lt;/strong&gt; "Audit this domain." Done.&lt;/p&gt;

&lt;p&gt;The agent picks the right tools, chains them, and gives you a summary. You focus on decisions, not plumbing.&lt;/p&gt;




&lt;h2&gt;
  
  
  Architecture
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;FastAPI&lt;/strong&gt; + official MCP Python SDK&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;35+ REST endpoints&lt;/strong&gt;, 24 MCP tools (same backend)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;1,115+ tests&lt;/strong&gt; (912 API + 203 C scanner)&lt;/li&gt;
&lt;li&gt;Domain scanner written in &lt;strong&gt;C&lt;/strong&gt; — scores SSL, DNS, headers, email in under 2 seconds&lt;/li&gt;
&lt;li&gt;All data from &lt;strong&gt;free, public sources&lt;/strong&gt; — no paid feeds, no vendor lock-in&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  What I Learned
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1. No API key = fastest adoption.&lt;/strong&gt;&lt;br&gt;
I removed the API key requirement and traffic jumped immediately. Zero friction wins. The free tier (100 req/hr) is generous enough that nobody has hit the limit yet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. MCP users are stickier.&lt;/strong&gt;&lt;br&gt;
MCP users make more requests per session than REST users. Once an agent has access to the tools, it chains them naturally — a single prompt can trigger 5-10 tool calls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Get listed everywhere, early.&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://mcp.so" rel="noopener noreferrer"&gt;mcp.so&lt;/a&gt;, &lt;a href="https://mcpservers.org" rel="noopener noreferrer"&gt;mcpservers.org&lt;/a&gt;, &lt;a href="https://smithery.ai" rel="noopener noreferrer"&gt;Smithery&lt;/a&gt; — these directories drive most of the discovery right now. The ecosystem is early and low-competition.&lt;/p&gt;




&lt;h2&gt;
  
  
  Limitations
&lt;/h2&gt;

&lt;p&gt;Being transparent about what this isn't:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Passive only&lt;/strong&gt; — no port scanning, no active exploitation. This is OSINT and public data, not a pentest tool.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rate limited&lt;/strong&gt; — 100 req/hr free, 1000/hr on Pro ($19/mo). Enough for individual use, not bulk scanning.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Solo project&lt;/strong&gt; — I'm one developer. Response times are fast, but I don't have an SRE team on-call.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;You don't need API keys&lt;/strong&gt; — we handle the integrations (Shodan, AbuseIPDB, ThreatFox, NVD, and more). No vendor accounts to set up on your end.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Try It
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/UPinar/contrastapi" rel="noopener noreferrer"&gt;github.com/UPinar/contrastapi&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;MCP setup:&lt;/strong&gt; &lt;a href="https://contrastcyber.com/mcp-setup" rel="noopener noreferrer"&gt;contrastcyber.com/mcp-setup&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Web scanner:&lt;/strong&gt; &lt;a href="https://contrastcyber.com" rel="noopener noreferrer"&gt;contrastcyber.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;API docs:&lt;/strong&gt; &lt;a href="https://api.contrastcyber.com" rel="noopener noreferrer"&gt;api.contrastcyber.com&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Free. Open source. No API key.&lt;/p&gt;

&lt;p&gt;If you find it useful, a ⭐ on GitHub helps more than you think.&lt;/p&gt;




&lt;p&gt;What security tools do you wish your AI agent could use? I'm always looking for what to build next.&lt;/p&gt;

</description>
      <category>security</category>
      <category>ai</category>
      <category>mcp</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
