home / mcp / malicious scanner mcp server

Malicious Scanner MCP Server

Provides access to Malicious Scanner API with real-time URL scanning via MCP client.

Installation
Add the following to your MCP client configuration file.

Configuration

View docs
{
  "mcpServers": {
    "bach-ai-tools-bachai-malicious-scanner": {
      "command": "python",
      "args": [
        "server.py"
      ],
      "env": {
        "API_KEY": "YOUR_API_KEY"
      }
    }
  }
}

You can access the Malicious Scanner API through this MCP Server, making it easy to incorporate real-time URL scanning into your applications with a dedicated, configurable interface.

How to use

You use an MCP client to connect to the Malicious Scanner MCP Server and perform scans via its available tools. The server exposes a real-time URL scanning capability that you can invoke from your application to check for malicious content.

How to install

Prerequisites: you need Python and a Python package installer, and you may optionally use the universal MCP runner uvx for streamlined startup.

Option A — Install from PyPI and run with uvx (recommended)

pip install bach-malicious_scanner
uvx --from bach-malicious_scanner bach_malicious_scanner

Option B — Install from source and run in development mode

pip install -e .

Option C — Install and run as a command after installation

pip install bach-malicious_scanner
bach_malicious_scanner

Note: To use the API from your application, you must provide authentication via an API key.

Additional configuration and security

API authentication requires you to set an environment variable for your runtime. This ensures your requests to the Malicious Scanner API are authorized.

Environment variable you need to set: API_KEY with your API key value.

Example usage while starting the MCP runtime (the MCP client will forward the API key to the server):

export API_KEY="your_api_key_here"
uvx --from bach-malicious_scanner bach_malicious_scanner

Available tools

scan_url

Real time, fully scans a URL for malicious content, including spam/gray classification and additional flags like domain age and more. Endpoint provided: GET /rapid/url