MCP(Model Context Protocol) FOR CYBERSECURITY
Abstract
The Model Context Protocol (MCP) for Cybersecurity Tools project transforms the open-source Gemini-CLI into a powerful, context-aware platform for cybersecurity applications. By addressing the challenge of maintaining persistent context in complex, multi-step cybersecurity workflows, MCP introduces a custom protocol that captures, stores, and intelligently reinjects task-relevant data.Integrated with a suite of industry-standard tools such as Nmap, Wireshark, Metasploit, sqlmap and more within a secure, sandboxed environment, the modified Gemini-CLI enables seamless automation of tasks like reconnaissance, vulnerability analysis, and exploitation simulation.
References
Cyproxio. “MCP for Security: A Collection of Model Context Protocol Servers for Popular Tools like SQLMap, Nmap, FFUF, Masscan and More.”_ GitHub Repository, 2025
Cato Networks. “Exploiting Model Context Protocol (MCP).”_ Cato Networks Blog, 2025.
Pillar Security. “The Security Risks of Model Context Protocol (MCP).”_ Pillar Security Blog, 2025
Microsoft Security Blog. “Understanding and Mitigating Security Risks in MCP Implementations.”_ Microsoft, 2025.
Tellache, A., Amara Korba, A., Mokhtari, A., Moldovan, H., & Ghamri-Doudane, Y. “Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence.”_ arXiv preprint, 2025.
Jiang, Y., Shang, F., Tan Wei You, F., Wang, H., Cong, C. R., Meng, Q., … & Lim, H. W. “VulCPE: Context-Aware Cybersecurity Vulnerability Retrieval and Management.”_ arXiv preprint, 2025.
Singh, R., Tariq, S., Jalalvand, F., Baruwal Chhetri, M., Nepal, S., Paris, C., & Lochner, M. “LLMs in the SOC: An Empirical Study of Human-AI Collaboration in Security Operations Centres.”_ arXiv preprint, 2025.
Olayinka, O. T., Jeswani, S., & Iloh, D. “Adaptive Cybersecurity Architecture for Digital Product Ecosystems Using Agentic AI.”_ arXiv preprint, 2025.
Refbacks
- There are currently no refbacks.