home / mcp / malicious scanner mcp server
Provides access to Malicious Scanner API with real-time URL scanning via MCP client.
Configuration
View docs{
"mcpServers": {
"bach-ai-tools-bachai-malicious-scanner": {
"command": "python",
"args": [
"server.py"
],
"env": {
"API_KEY": "YOUR_API_KEY"
}
}
}
}You can access the Malicious Scanner API through this MCP Server, making it easy to incorporate real-time URL scanning into your applications with a dedicated, configurable interface.
You use an MCP client to connect to the Malicious Scanner MCP Server and perform scans via its available tools. The server exposes a real-time URL scanning capability that you can invoke from your application to check for malicious content.
Prerequisites: you need Python and a Python package installer, and you may optionally use the universal MCP runner uvx for streamlined startup.
Option A — Install from PyPI and run with uvx (recommended)
pip install bach-malicious_scanner
uvx --from bach-malicious_scanner bach_malicious_scannerOption B — Install from source and run in development mode
pip install -e .Option C — Install and run as a command after installation
pip install bach-malicious_scanner
bach_malicious_scannerNote: To use the API from your application, you must provide authentication via an API key.
API authentication requires you to set an environment variable for your runtime. This ensures your requests to the Malicious Scanner API are authorized.
Environment variable you need to set: API_KEY with your API key value.
Example usage while starting the MCP runtime (the MCP client will forward the API key to the server):
export API_KEY="your_api_key_here"
uvx --from bach-malicious_scanner bach_malicious_scannerReal time, fully scans a URL for malicious content, including spam/gray classification and additional flags like domain age and more. Endpoint provided: GET /rapid/url