Mesh Scanner
A simple, self-contained notes system with resources, tools, and prompts, implemented as an MCP server.
MESH by Viscount Vulnerability Scanner MCP Server
Version 0.2.0 - Enhanced with prompts, resources, and comprehensive security assessment tools
A comprehensive MCP server for scanning and analyzing MESH by Viscount systems for default credential vulnerabilities. This tool is designed for security research and educational purposes only.
🚨 Important Notice
This tool is for educational and security research purposes only. Unauthorized access to systems is illegal. Always obtain proper authorization before scanning any systems.
Features
🔍 Scanning Capabilities
- Single IP Scanning: Scan individual IP addresses for MESH systems
- IP Range Scanning: Scan entire IP ranges with configurable concurrency
- Default Credential Testing: Test for the default credentials (freedom:viscount)
- System Discovery: Identify MESH by Viscount systems on networks
📊 Security Assessment
- Comprehensive Reports: Generate detailed security assessment reports
- Vulnerability Summaries: Track vulnerabilities across timeframes
- Compliance Reports: Generate reports for NIST, ISO27001, SOC2, and PCI-DSS
- Risk Analysis: Automatic risk level assessment (LOW, MEDIUM, HIGH, CRITICAL)
📋 Data Export
- Multiple Formats: Export results as JSON, CSV, or XML
- Filtered Export: Export only vulnerable systems or specific scans
- Historical Data: Maintain scan history and statistics
🎯 Advanced Features
- System Information: Extract building details, user lists, and event logs
- Entrance Control: Demonstrate entrance unlocking (educational only)
- Real-time Monitoring: Track scanning progress and results
- Rate Limiting: Configurable rate limiting for responsible scanning
Installation
# Install dependencies
npm install
# Build the server
npm run build
# Run the server
npm start
MCP Configuration
Add to your MCP configuration file:
{
"mcpServers": {
"mesh-scanner": {
"command": "node",
"args": ["path/to/mesh-scanner/build/index.js"]
}
}
}
Usage
Basic Scanning
Scan a Single IP
{
"tool": "scan_ip",
"arguments": {
"ipAddress": "192.168.1.100"
}
}
Scan an IP Range
{
"tool": "scan_ip_range",
"arguments": {
"startIp": "192.168.1.1",
"endIp": "192.168.1.254",
"concurrency": 5,
"timeout": 5000
}
}
Security Assessment
Generate Security Report
{
"prompt": "security_assessment",
"arguments": {
"format": "detailed",
"scan_id": "scan_123456789"
}
}
Vulnerability Summary
{
"prompt": "vulnerability_summary",
"arguments": {
"timeframe": "7d"
}
}
Compliance Report
{
"prompt": "compliance_report",
"arguments": {
"standard": "NIST"
}
}
Remediation Guide
{
"prompt": "remediation_guide",
"arguments": {
"system_ip": "192.168.1.100",
"severity": "high"
}
}
Data Export
Export All Results
{
"tool": "export_scan_results",
"arguments": {
"format": "json"
}
}
Export Vulnerable Systems Only
{
"tool": "export_scan_results",
"arguments": {
"format": "csv",
"includeVulnerableOnly": true
}
}
System Information
Get System Details
{
"tool": "get_system_info",
"arguments": {
"url": "http://192.168.1.100"
}
}
Resources
Access real-time data through MCP resources:
mesh://scan-results- Latest scan resultsmesh://vulnerable-systems- List of vulnerable systemsmesh://scan-history- Historical scan datamesh://vulnerability-stats- Statistics and trendsmesh://system-details- Detailed system informationmesh://security-assessments- Generated assessments
Prompts
The server provides several prompts for comprehensive security analysis:
1. Security Assessment
Generates detailed security reports with risk analysis and recommendations.
Arguments:
scan_id(optional): Specific scan to analyzeformat: "detailed", "summary", or "executive"
2. Vulnerability Summary
Creates summaries of vulnerabilities found across different timeframes.
Arguments:
timeframe: "24h", "7d", "30d", or "all"
3. Remediation Guide
Provides specific remediation steps for vulnerable systems.
Arguments:
system_ip: IP address of vulnerable systemseverity: "low", "medium", "high", or "critical"
4. Compliance Report
Generates compliance reports for various security standards.
Arguments:
standard: "NIST", "ISO27001", "SOC2", or "PCI-DSS"
Tools
scan_ip
Scan a single IP address for MESH system and test default credentials.
Parameters:
ipAddress(string): IP address to scantimeout(number, optional): Timeout in millisecondsconfig(object, optional): Additional configuration
scan_ip_range
Scan a range of IP addresses for MESH systems.
Parameters:
startIp(string): Starting IP addressendIp(string): Ending IP addressconcurrency(number, optional): Concurrent scans (max: 20)timeout(number, optional): Timeout in millisecondsconfig(object, optional): Additional configuration
test_default_credentials
Test if a MESH system is vulnerable to default credentials.
Parameters:
url(string): URL of the MESH systemconfig(object, optional): Additional configuration
get_system_info
Get detailed information about a vulnerable MESH system.
Parameters:
url(string): URL of the vulnerable systemconfig(object, optional): Additional configuration
unlock_entrance
Unlock an entrance (educational purposes only).
Parameters:
url(string): URL of the vulnerable systementranceId(string): ID of the entrance to unlockconfig(object, optional): Additional configuration
export_scan_results
Export scan results to various formats.
Parameters:
format(string): "json", "csv", or "xml"includeVulnerableOnly(boolean, optional): Export only vulnerable systemsscanId(string, optional): Specific scan ID to export
Configuration
Scan Configuration
interface ScanConfig {
timeout: number; // Request timeout in ms (default: 5000)
concurrency: number; // Concurrent scans (default: 5, max: 20)
rateLimit: number; // Rate limit between requests (default: 100)
userAgent: string; // Custom User-Agent string
}
Default Credentials
- Username: freedom
- Password: viscount
Security Considerations
Risk Levels
- CRITICAL: >50% of systems vulnerable
- HIGH: >20% of systems vulnerable
- MEDIUM: >10% of systems vulnerable
- LOW: ≤10% of systems vulnerable
Recommendations
- Immediate: Change default credentials on all vulnerable systems
- Short-term: Implement network segmentation and monitoring
- Long-term: Establish regular security assessments and training
Legal and Ethical Use
This tool is provided for:
- Security research and education
- Authorized penetration testing
- Vulnerability assessment with proper authorization
- Security awareness training
Users are responsible for ensuring they have proper authorization before scanning any systems.
Contributing
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests if applicable
- Submit a pull request
License
This project is provided for educational purposes. Use responsibly and in accordance with applicable laws and regulations.
Support
For issues, questions, or contributions, please open an issue on the GitHub repository.
Server Terkait
Liquidium MCP Server
Tools for PostHog analytics, annotations, and project management.
Outline MCP Server
MCP server for the Outline knowledge base and document management tool.
MATLAB MCP Core Server
Run MATLAB® using AI applications with the official MATLAB MCP Server from MathWorks®.
Computer Control MCP
Control your computer's mouse, keyboard, and perform OCR using PyAutoGUI and RapidOCR. Works on Windows, with potential support for other platforms.
Macuse
Let your AI assistant directly manage calendar, email, notes, and control any Mac app.
Vynn
Self-improving AI workflows with natural language backtesting. 21 MCP tools for creating workflows, backtesting trading strategies, parameter sweeps, portfolio optimization, prompt optimization, cron scheduling, and webhook triggers. Install: pip install vynn-mcp
Airflow MCP
Interact with Apache Airflow using natural language to manage and monitor your data workflows.
Routine
MCP server to interact with Routine: calendars, tasks, notes, etc.
OneNote
Interact with Microsoft OneNote using AI language models like Claude and other LLMs.
n8n Manager for AI Agents
Manage n8n workflow automation instances through natural language using the n8n public API.