loading…
Search for a command to run...
loading…
PCI DSS v4.0.1 static-analysis MCP server for Go payment codebases. 12 scanners detect PAN/CVV exposure, weak crypto, missing audit logs, vulnerable deps, TLS m
PCI DSS v4.0.1 static-analysis MCP server for Go payment codebases. 12 scanners detect PAN/CVV exposure, weak crypto, missing audit logs, vulnerable deps, TLS misconfig, auth weaknesses, plus CycloneDX 1.6 SBOM generation - each finding mapped to the exact PCI requirement. AI-assisted triage via triagefindings. Keyless-signed multi-arch Docker image on ghcr.io.
Static analysis MCP server that detects PCI DSS v4.0.1 violations in Go payment service codebases. Every finding maps to a specific PCI DSS requirement number.
Go Report Card License: MIT OpenSSF Scorecard MCP Registry pci-dss-mcp MCP server
pci-dss-mcp is a stdio MCP server that runs 12 scanners, an orchestrator, and an AI triage engine over a Go payment service codebase. Each finding carries a requirement_id mapped to a specific PCI DSS v4.0.1 line item; see docs/requirement-mapping.md for the canonical rule-to-requirement table and testdata/vulnerable-payment-service/EXPECTED-FINDINGS.md for live golden output.
Requires Go 1.25+:
go install github.com/shyshlakov/pci-dss-mcp@latest
The binary lands at $(go env GOPATH)/bin/pci-dss-mcp. See docs/install-from-source.md for PATH resolution, the macOS codesign provenance fix, cosign verification, and the MCP client JSON config.
docker pull ghcr.io/shyshlakov/pci-dss-mcp:v0.6.2
Useful for CI pipelines, QSA auditors who do not develop Go locally, or any environment without a host Go toolchain.
Listed as io.github.shyshlakov/pci-dss-mcp at registry.modelcontextprotocol.io. Auto-published on every tag.
Add to your MCP client config (Claude Desktop claude_desktop_config.json, Cursor .cursor/mcp.json, or claude mcp add for Claude Code):
{
"mcpServers": {
"pci-dss-mcp": {
"command": "docker",
"args": ["run", "-i", "--rm",
"--mount", "type=bind,src=/Users/you/go/src,dst=/Users/you/go/src,readonly",
"ghcr.io/shyshlakov/pci-dss-mcp:v0.6.2"]
}
}
}
src= and dst= mirror the same absolute path so the container sees your code at the same path your host uses; prompts pass the normal host path with no translation. For the go install variant and per-client examples, see docs/usage.md.
Two prompts to paste into your MCP client:
Run pci-dss-mcp triage on /Users/you/payments-service. Use min_severity=MEDIUM and group findings by PCI DSS requirement.Generate a PCI DSS compliance report for /Users/you/payments-service in JSON format. Show requirement-level pass/fail status and severity counts.| Tool | Purpose | Docs |
|---|---|---|
triage_findings |
All scanners + AI classification + file:line context in one call | docs/triage_findings.md |
generate_compliance_report |
Raw requirement pass/fail report (orchestrator over all scanners) | docs/generate_compliance_report.md |
scan_pan_data |
PAN/SAD storage and logging (3.3.1, 3.4.1, 3.5.1) | docs/scan_pan_data.md |
check_encryption |
Weak hashing, hardcoded keys, plain HTTP (4.2.1, 6.2.4) | docs/check_encryption.md |
check_tls_config |
Insecure TLS configs (4.2.1) | docs/check_tls_config.md |
check_secrets_in_configs |
Credentials in config files (8.6.2) | docs/check_secrets_in_configs.md |
check_error_handling |
Error responses leaking sensitive context (6.2.4) | docs/check_error_handling.md |
check_auth_strength |
Hardcoded passwords, weak policy, missing MFA, webhook signatures (8.3.1, 8.3.6, 8.4.2, 8.6.2) | docs/check_auth_strength.md |
audit_log_coverage |
Missing audit logs on payment flows (10.2.1) | docs/audit_log_coverage.md |
check_data_retention |
Missing TTL, sensitive storage, missing zeroing (3.2.1, 3.3.1) | docs/check_data_retention.md |
check_payment_page_scripts |
Missing CSP/SRI/nonce on payment pages (6.4.3, 11.6.1) | docs/check_payment_page_scripts.md |
check_dependencies |
Vulnerable Go dependencies via OSV (6.3.3); also covers update_vulnerability_db |
docs/check_dependencies.md |
generate_sbom |
CycloneDX 1.6 SBOM from go.mod/go.sum (6.3.2) | docs/generate_sbom.md |
explain_requirement |
Look up a PCI DSS v4.0.1 requirement by ID | docs/explain_requirement.md |
All tools declare typed OutputSchema. See docs/tools.md for the catalog index and migration history.
Active development, pre v1.0. See ROADMAP.md and CHANGELOG.md.
MIT, see LICENSE.
pci-dss-mcp is a static analysis tool. It cannot replace a Qualified Security Assessor. Use its output as input to your compliance process, not as the compliance itself.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"shyshlakov-pci-dss-mcp": {
"command": "npx",
"args": []
}
}
}