English | 日本語
A Model Context Protocol (MCP) server that provides seamless integration between AI assistants (like Claude Desktop) and Black Duck Coverity Connect static analysis platform.
Transform your Coverity workflow with natural language commands and automated analysis through AI-powered interactions.
- Project Management: List and explore Coverity projects and streams
- Defect Analysis: Advanced defect search with intelligent filtering and detailed analysis
- User Management: Complete user administration, role management, and access control
- Security Focus: Specialized security vulnerability detection and analysis
- CI/CD Automation: Automated pipeline integration for continuous quality monitoring
- Quality Reports: Executive-level quality dashboards and trend analysis
- Natural Language Queries: "Show me critical security issues in project X" or "List users with administrator privileges"
- Intelligent Filtering: Automatic prioritization of high-impact defects and user access management
- Contextual Recommendations: AI-driven remediation suggestions and security audit insights
- Trend Analysis: Historical data analysis, quality metrics, and user activity patterns
- SOAP API Integration: Full Coverity Connect Web Services support
- Authentication: Secure auth-key based authentication
- Proxy Support: Corporate network and proxy configuration
- Multi-Platform: Windows, macOS, and Linux support
- Docker Ready: Containerized deployment for enterprise environments
For Claude Desktop users, download the DXT package from the latest release:
-
Download DXT Package:
- Go to Releases
- Download
coverity-connect-mcp-1.0.0.dxt
from the latest release
-
Install in Claude Desktop:
- Drag and drop the
.dxt
file into Claude Desktop - Configure environment variables (see Configuration section)
- Drag and drop the
# Install directly from GitHub (recommended)
pip install git+https://github.com/keides2/coverity-connect-mcp.git
# Clone and install from source
git clone https://github.com/keides2/coverity-connect-mcp.git
cd coverity-connect-mcp
pip install -e .
For development purposes:
git clone https://github.com/keides2/coverity-connect-mcp.git
cd coverity-connect-mcp
# Create virtual environment
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install with development dependencies
pip install -e ".[dev]"
These installation methods are planned for future releases:
pip install coverity-connect-mcp
docker pull keides2/coverity-connect-mcp:latest
Create a .env
file or set environment variables:
# Required - Coverity Connect Authentication
export COVAUTHUSER="your_coverity_username"
export COVAUTHKEY="your_coverity_auth_key"
# Required - Coverity Server
export COVERITY_HOST="your-coverity-server.com"
export COVERITY_PORT="443"
export COVERITY_SSL="True"
# Optional - Local Workspace
export COVERITY_BASE_DIR="/path/to/coverity/workspace"
# Optional - Corporate Proxy (if needed)
export PROXY_HOST="your-proxy-server.com"
export PROXY_PORT="3128"
export PROXY_USER="proxy_username" # if authentication required
export PROXY_PASS="proxy_password" # if authentication required
Add to your claude_desktop_config.json
:
{
"mcpServers": {
"coverity-connect": {
"command": "coverity-mcp-server",
"env": {
"COVAUTHUSER": "${COVAUTHUSER}",
"COVAUTHKEY": "${COVAUTHKEY}",
"COVERITY_HOST": "your-coverity-server.com"
}
}
}
}
Note: Since the Docker image is not yet published, you can build it locally:
# docker-compose.yml
version: '3.8'
services:
coverity-mcp:
build: . # Build from local source
# Future: image: keides2/coverity-connect-mcp:latest
environment:
- COVAUTHUSER=${COVAUTHUSER}
- COVAUTHKEY=${COVAUTHKEY}
- COVERITY_HOST=${COVERITY_HOST}
# Optional proxy settings
- PROXY_HOST=${PROXY_HOST}
- PROXY_PORT=${PROXY_PORT}
ports:
- "8000:8000"
Show me all Coverity projects and their current status
Analyze the latest snapshot of project "MyWebApp" and focus on high-severity security vulnerabilities. Provide specific remediation recommendations.
Generate a comprehensive quality report for project "MyProject" including trends over the last 30 days
Run automated Coverity analysis for group "web-team", project "frontend", branch "main" with commit message "Security fixes"
Show me all CERT-C violations in project "EmbeddedSystem" with impact level "High" and provide code examples for fixes
List all users with administrator privileges and show their last login times
Show me the permissions and role assignments for user "developer1" and identify any security concerns
Tool | Description | Example Usage |
---|---|---|
search_defects |
Advanced defect search with filtering | Find high-severity security vulnerabilities |
get_defect_details |
Get detailed information about a specific defect | Analyze defect events and remediation steps |
list_projects |
List all accessible Coverity projects | Project inventory and access verification |
list_streams |
Get streams for a specific project | Stream-based analysis planning |
get_project_summary |
Get comprehensive project analysis | Executive project health reports |
list_users |
🆕 List all users in Coverity Connect | User inventory and access management |
get_user_details |
🆕 Get detailed information about a user | User profile and account status verification |
get_user_roles |
🆕 Get user role and permission information | Security audit and access control review |
- Getting Started Guide - 📋 Complete setup guide for production environments
- Setup Guide - Complete development to production setup
- Installation Guide - Detailed setup instructions for all platforms
- Configuration Reference - Complete configuration options and security settings
- API Reference - Comprehensive API documentation with examples
- Usage Examples - Environment-specific configurations and examples
- 本番環境セットアップガイド - 📋 本番環境での完全な立ち上げ手順
- インストールガイド - 詳細なセットアップ手順(全プラットフォーム対応)
- 設定リファレンス - 完全な設定オプションとセキュリティ設定
- API リファレンス - 包括的なAPI仕様書と使用例
- 使用例 - 環境別設定とサンプル
🌐 多言語サポート: 英語と日本語の完全ドキュメントを提供しています。すべてのガイドにはステップバイステップの手順、トラブルシューティングのヒント、実用的な例が含まれています。
# Run unit tests
pytest tests/
# Run integration tests
pytest tests/ -m integration
# Run with coverage
pytest --cov=coverity_mcp_server tests/
# Test with Docker
docker-compose -f docker-compose.test.yml up --abort-on-container-exit
We welcome contributions! Please see our Contributing Guide for details.
git clone https://github.com/keides2/coverity-connect-mcp.git
cd coverity-connect-mcp
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
pip install -e ".[dev]"
pre-commit install
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature
) - Commit your changes (
git commit -m 'Add amazing feature'
) - Push to the branch (
git push origin feature/amazing-feature
) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
- Black Duck Coverity for providing the static analysis platform
- Anthropic for the Model Context Protocol and Claude AI
- Open Source Community for the foundational libraries and tools
- GitHub Issues: Report bugs or request features
- Discussions: Community support and questions
- Security Issues: Please see our Security Policy
- v1.0: Complete MCP implementation with user management ✨
- v1.1: Advanced filtering, custom views, and analytics dashboards
- v1.2: Multi-tenant support and enhanced user administration
- v1.3: GraphQL API and real-time notifications
- v1.4: Machine learning-powered defect prioritization and risk assessment
- v2.0: Plugin architecture and third-party integrations
Made with ❤️ for the software security community
Transform your static analysis workflow with the power of AI