Skip to content
clusters: prooflayer · edgemarket · edgefinance · synthforge · mediakit · wordmint · webprobe · locale · comppoint
$ man cve-lookup

/cve-lookup(1)

agentutility / prooflayer / cve-lookup
PRICE / CALL
$0.005
USDC · base mainnet · scheme: exact
METHOD
POST
CLUSTER
prooflayer
CATEGORY
ai
STATUS
live
NAME
cve-lookup cve lookup / vulnerability database
SYNOPSIS
POST https://x402.org/v1/cve-lookup
     Content-Type: application/json
     X-PAYMENT:    <signed-transferWithAuthorization>

     { ... }
↳ first call → 402 Payment Required. Sign USDCtransferWithAuthorization, retry with theX-PAYMENT header.
DESCRIPTION

CVE lookup / vulnerability database. NIST NVD-backed. CVSS v3.1 + v2 scores, severity, affected CPEs, CWE class, references, public-exploit indicators. Plus LLM exploitability summary.

INPUTrequest schema
propertytypedescriptionreq?
cve_idstringe.g. 'CVE-2021-44228'.required
OUTPUTresponse shape
fieldtypedescription
cve_idstringCVE identifier in standard CVE-YYYY-NNNNN format.
descriptionstringOfficial NVD summary of the vulnerability and its impact.
publishedstringISO 8601 timestamp of when the CVE was first published to NVD.
cvss_v3_1objectFull CVSS v3.1 metrics object with base score, vector string, and impact/exploitability subscores.
cvss_v2objectFull CVSS v2 metrics object with base score, vector, and access/impact subscores when available.
scorenumberPrimary numeric CVSS score (v3.1 base score preferred, falls back to v2) on a 0-10 scale.
severitystringSeverity label derived from the CVSS score: NONE, LOW, MEDIUM, HIGH, or CRITICAL.
cwearrayArray of associated CWE identifiers classifying the weakness type (e.g. CWE-79, CWE-89).
affected_cpesarrayArray of CPE 2.3 URIs identifying vendor, product, and version ranges affected by the CVE.
exploit_summarystringLLM-generated plain-English summary of how the vulnerability is exploited and its practical impact.
public_exploit_knownbooleanTrue if a public proof-of-concept or weaponized exploit exists for this CVE.
exploit_referencesarrayArray of URLs pointing to public exploit code, PoCs, or exploit-DB entries for the CVE.
referencesarrayArray of NVD reference URLs: vendor advisories, patches, mailing-list posts, and analysis writeups.
EXAMPLEStwo ways to call
EXAMPLE 1 · curl
curl -X POST https://x402.org/v1/cve-lookup \
  -H 'Content-Type: application/json' \
  -d '{ }'
first response = 402 Payment Required with payment requirements; sign + retry with X-PAYMENT.
EXAMPLE 2 · mcp
# install once
claude mcp add x402 --command "npx x402-deployer-mcp"

# then ask Claude Code:
# "use the cve-lookup tool to ..."
MCP server handles payment automatically — your coding agent just calls the tool by name.
METADATA
tags
cvevulnerabilitysecuritynvdexploit
env
VENICE_API_KEY
methods
POST
cluster
prooflayer
price
$0.005 USDC per call
ADJACENTother endpoints in prooflayer
endpointdescriptionprice
cveCVE lookup / vulnerability database.$0.005
pypi-package-riskPyPI package risk score / Python supply-chain scanner.$0.01
db-migration-riskDB migration risk audit / SQL migration safety check / DROP COLUMN detector / unsafe ALTER TABLE detector / Postgres CREATE INDEX CONCURR…$0.02
deploy-config-riskdeploy config audit / Dockerfile lint / vercel.json hardening / wrangler.toml review / docker-compose.yml safety / fly.toml secrets check…$0.02
secrets-exposure-checksecrets exposure scan / hardcoded API key detector / .env-committed-key audit / Next.js client env leak detector / pre-deploy secret gate.$0.02
ai-content-detectorAI content detector / GPT detector / ChatGPT plagiarism checker.$0.03
dep-risk-summaryrepo dependency risk audit / package.json + lockfile vetter / unpinned dep detector / transitive dep counter / requirements.txt audit / p…$0.03
github-repo-healthGitHub repo health score / open-source maintainability checker.$0.03
SEE ALSO
agentutility(7) · prooflayer(7) · x402(7) · mcp(7) · llms.txt · registry.json · bazaar.x402.org